{ "metadata": { "split_name": "test", "num_records": 1452, "vulnerability_distribution": { "sql_injection": 1161, "privilege_escalation": 291 }, "date_range": { "start": "2002-12-31", "end": "2019-11-14" } }, "conversations": [ { "Unnamed: 0": "CVE-2005-4606", "mod_date": "2018-10-19", "pub_date": "2005-12-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in check_user.asp in multiple web wiz products including (1) site news 3.06 and earlier, (2) journal 1.0 and earlier, (3) polls 3.06 and earlier, and (4) and database login 1.71 and earlier allows remote attackers to execute arbitrary sql commands via the txtusername parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in check_user.asp in multiple web wiz products including (1) site news 3.06 and earlier, (2) journal 1.0 and earlier, (3) polls 3.06 and earlier, and (4) and database login 1.71 and earlier allows remote attackers to execute arbitrary sql commands via the txtusername parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-12-31\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2010-4619", "mod_date": "2017-08-17", "pub_date": "2010-12-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in profil.php in mafya oyun scrpti (aka mafia game script) allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in profil.php in mafya oyun scrpti (aka mafia game script) allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-12-29\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2014-10033", "mod_date": "2017-09-08", "pub_date": "2015-01-13", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the update_zone function in catalog/admin/geo_zones.php in oscommerce online merchant 2.3.3.4 and earlier allows remote administrators to execute arbitrary sql commands via the zid parameter in a list action.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the update_zone function in catalog/admin/geo_zones.php in oscommerce online merchant 2.3.3.4 and earlier allows remote administrators to execute arbitrary sql commands via the zid parameter in a list action.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-13\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2008-7085", "mod_date": "2017-09-29", "pub_date": "2009-08-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in thehockeystop hockeystats online 2.0 basic and advanced allow remote attackers to execute arbitrary sql commands via the (1) id parameter in the viewpage action to the default uri, probably index.php, or (2) divid parameter in the schedule action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in thehockeystop hockeystats online 2.0 basic and advanced allow remote attackers to execute arbitrary sql commands via the (1) id parameter in the viewpage action to the default uri, probably index.php, or (2) divid parameter in the schedule action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-08-26\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-6164", "mod_date": "2018-10-15", "pub_date": "2007-11-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in eurologon cms allow remote attackers to execute arbitrary sql commands via the id parameter to (1) reviews.php, (2) links.php and (3) articles.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in eurologon cms allow remote attackers to execute arbitrary sql commands via the id parameter to (1) reviews.php, (2) links.php and (3) articles.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-11-29\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2009-2017", "mod_date": "2017-09-29", "pub_date": "2009-06-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in products.php in virtue book store allows remote attackers to execute arbitrary sql commands via the cid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in products.php in virtue book store allows remote attackers to execute arbitrary sql commands via the cid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-06-09\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2014-8999", "mod_date": "2014-11-24", "pub_date": "2014-11-20", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in htdocs/modules/system/admin.php in xoops before 2.5.7 final allows remote authenticated users to execute arbitrary sql commands via the selgroups parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in htdocs/modules/system/admin.php in xoops before 2.5.7 final allows remote authenticated users to execute arbitrary sql commands via the selgroups parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-11-20\n- Last Modified Date: 2014-11-24" } ] }, { "Unnamed: 0": "CVE-2016-6716", "mod_date": "2016-12-06", "pub_date": "2016-11-25", "cvss": 4.3, "cwe_code": 284, "cwe_name": " Improper Access Control", "summary": "an elevation of privilege vulnerability in the aosp launcher in android 7.0 before 2016-11-01 could allow a local malicious application to create shortcuts that have elevated privileges without the user's consent. this issue is rated as moderate because it is a local bypass of user interaction requirements (access to functionality that would normally require either user initiation or user permission). android id: a-30778130.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Access Control." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 284:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.3\n- CWE Name: Improper Access Control\n- Summary: an elevation of privilege vulnerability in the aosp launcher in android 7.0 before 2016-11-01 could allow a local malicious application to create shortcuts that have elevated privileges without the user's consent. this issue is rated as moderate because it is a local bypass of user interaction requirements (access to functionality that would normally require either user initiation or user permission). android id: a-30778130.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2016-11-25\n- Last Modified Date: 2016-12-06" } ] }, { "Unnamed: 0": "CVE-2005-1487", "mod_date": "2018-10-19", "pub_date": "2005-05-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "** disputed ** multiple sql injection vulnerabilities in fishcart 3.1 allow remote attackers to execute arbitrary sql commands via the (1) cartid parameter to upstnt.php or (2) psku parameter to display.php. note: the vendor disputes this report, saying that they are forced sql errors. the original researcher is known to be unreliable.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ** disputed ** multiple sql injection vulnerabilities in fishcart 3.1 allow remote attackers to execute arbitrary sql commands via the (1) cartid parameter to upstnt.php or (2) psku parameter to display.php. note: the vendor disputes this report, saying that they are forced sql errors. the original researcher is known to be unreliable.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-05-11\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2018-14501", "mod_date": "2018-09-17", "pub_date": "2018-07-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "manager/admin_ajax.php in joyplus-cms 1.6.0 has sql injection, as demonstrated by crafted post data beginning with an \"m_id=1 and sleep(5)\" substring.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: manager/admin_ajax.php in joyplus-cms 1.6.0 has sql injection, as demonstrated by crafted post data beginning with an \"m_id=1 and sleep(5)\" substring.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-07-22\n- Last Modified Date: 2018-09-17" } ] }, { "Unnamed: 0": "CVE-2019-15251", "mod_date": "2019-10-18", "pub_date": "2019-10-16", "cvss": 5.2, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "multiple vulnerabilities in cisco spa100 series analog telephone adapters (atas) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. the vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. an attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. a successful exploit could allow the attacker to execute arbitrary code with elevated privileges. note: the web-based management interface is enabled by default.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "ADJACENT_NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 5.2\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: multiple vulnerabilities in cisco spa100 series analog telephone adapters (atas) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. the vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. an attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. a successful exploit could allow the attacker to execute arbitrary code with elevated privileges. note: the web-based management interface is enabled by default.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: ADJACENT_NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-16\n- Last Modified Date: 2019-10-18" } ] }, { "Unnamed: 0": "CVE-2005-4380", "mod_date": "2017-07-20", "pub_date": "2005-12-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in bitweaver 1.1 and 1.1.1 beta allow remote attackers to execute arbitrary sql commands via the (1) sort_mode parameter to (a) fisheye/list_galleries.php, (b) messages/message_box.php, and (c) users/my.php; the (2) post_id parameter to (d) blogs/view_post.php; and the (3) blog_id parameter to (e) blogs/view.php, which are not properly cleansed by the convert_sortmode function in kernel/bitdb.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in bitweaver 1.1 and 1.1.1 beta allow remote attackers to execute arbitrary sql commands via the (1) sort_mode parameter to (a) fisheye/list_galleries.php, (b) messages/message_box.php, and (c) users/my.php; the (2) post_id parameter to (d) blogs/view_post.php; and the (3) blog_id parameter to (e) blogs/view.php, which are not properly cleansed by the convert_sortmode function in kernel/bitdb.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-12-20\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2017-11879", "mod_date": "2018-02-01", "pub_date": "2017-11-15", "cvss": 4.3, "cwe_code": 601, "cwe_name": " URL Redirection to Untrusted Site ('Open Redirect')", "summary": "asp.net core 2.0 allows an attacker to steal log-in session information such as cookies or authentication tokens via a specially crafted url aka \"asp.net core elevation of privilege vulnerability\".", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: URL Redirection to Untrusted Site ('Open Redirect')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 601:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.3\n- CWE Name: URL Redirection to Untrusted Site ('Open Redirect')\n- Summary: asp.net core 2.0 allows an attacker to steal log-in session information such as cookies or authentication tokens via a specially crafted url aka \"asp.net core elevation of privilege vulnerability\".\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-11-15\n- Last Modified Date: 2018-02-01" } ] }, { "Unnamed: 0": "CVE-2016-0176", "mod_date": "2018-10-12", "pub_date": "2016-05-11", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "dxgkrnl.sys in the directx graphics kernel subsystem in the kernel-mode drivers in microsoft windows 7 sp1, windows server 2008 r2 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"microsoft directx graphics kernel subsystem elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: dxgkrnl.sys in the directx graphics kernel subsystem in the kernel-mode drivers in microsoft windows 7 sp1, windows server 2008 r2 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"microsoft directx graphics kernel subsystem elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-05-11\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2016-10917", "mod_date": "2019-08-26", "pub_date": "2019-08-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the search-everything plugin before 8.1.6 for wordpress has sql injection related to empty search strings, a different vulnerability than cve-2014-2316.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the search-everything plugin before 8.1.6 for wordpress has sql injection related to empty search strings, a different vulnerability than cve-2014-2316.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-22\n- Last Modified Date: 2019-08-26" } ] }, { "Unnamed: 0": "CVE-2018-16261", "mod_date": "2019-10-03", "pub_date": "2018-09-06", "cvss": 4.6, "cwe_code": 295, "cwe_name": " Improper Certificate Validation", "summary": "in pulse secure pulse desktop client 5.3rx before 5.3r5 and 9.0r1, there is a privilege escalation vulnerability with dynamic certificate trust.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Certificate Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 295:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Improper Certificate Validation\n- Summary: in pulse secure pulse desktop client 5.3rx before 5.3r5 and 9.0r1, there is a privilege escalation vulnerability with dynamic certificate trust.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-09-06\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2008-4156", "mod_date": "2017-09-29", "pub_date": "2008-09-19", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in print.php in customcms (ccms) gaming portal 4.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in print.php in customcms (ccms) gaming portal 4.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-19\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-5430", "mod_date": "2018-10-15", "pub_date": "2007-10-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in stride 1.0 allow remote attackers to execute arbitrary sql commands via (1) the p parameter to main.php in the content management system, (2) the id parameter in a sto cmd action to shop.php in the merchant subsystem, or the (3) course or (4) provider parameter to detail.php in the courses subsystem.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in stride 1.0 allow remote attackers to execute arbitrary sql commands via (1) the p parameter to main.php in the content management system, (2) the id parameter in a sto cmd action to shop.php in the merchant subsystem, or the (3) course or (4) provider parameter to detail.php in the courses subsystem.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-10-12\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2008-2460", "mod_date": "2018-10-11", "pub_date": "2008-05-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in faq.php in vbulletin 3.7.0 gold allows remote attackers to execute arbitrary sql commands via the q parameter in a search action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in faq.php in vbulletin 3.7.0 gold allows remote attackers to execute arbitrary sql commands via the q parameter in a search action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-27\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2008-2872", "mod_date": "2017-10-19", "pub_date": "2008-06-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in default.asp in shibby shop 2.2 and earlier allows remote attackers to execute arbitrary sql commands via the sayfa parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in default.asp in shibby shop 2.2 and earlier allows remote attackers to execute arbitrary sql commands via the sayfa parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-26\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2016-1393", "mod_date": "2016-11-28", "pub_date": "2016-05-12", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in cisco cloud network automation provisioner (cnap) 1.0 and 1.1 allows remote authenticated users to execute arbitrary sql commands via a crafted url, aka bug id cscuy72175.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in cisco cloud network automation provisioner (cnap) 1.0 and 1.1 allows remote authenticated users to execute arbitrary sql commands via a crafted url, aka bug id cscuy72175.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-05-12\n- Last Modified Date: 2016-11-28" } ] }, { "Unnamed: 0": "CVE-2019-9936", "mod_date": "2019-06-04", "pub_date": "2019-03-22", "cvss": 5.0, "cwe_code": 125, "cwe_name": " Out-of-bounds Read", "summary": "in sqlite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5hashentrysort in sqlite3.c, which may lead to an information leak. this is related to ext/fts5/fts5_hash.c.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Out-of-bounds Read." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 125:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Out-of-bounds Read\n- Summary: in sqlite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5hashentrysort in sqlite3.c, which may lead to an information leak. this is related to ext/fts5/fts5_hash.c.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2019-03-22\n- Last Modified Date: 2019-06-04" } ] }, { "Unnamed: 0": "CVE-2009-1259", "mod_date": "2017-09-29", "pub_date": "2009-04-07", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in inc/bb/topic.php in insane visions adaptbb 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the topic_id parameter in a topic action to index.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in inc/bb/topic.php in insane visions adaptbb 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the topic_id parameter in a topic action to index.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-07\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-1263", "mod_date": "2017-09-29", "pub_date": "2009-04-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in sub_commententry.php in the bookjoomlas (com_bookjoomlas) component 0.1 for joomla! allows remote attackers to execute arbitrary sql commands via the gbid parameter in a comment action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in sub_commententry.php in the bookjoomlas (com_bookjoomlas) component 0.1 for joomla! allows remote attackers to execute arbitrary sql commands via the gbid parameter in a comment action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-07\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2013-6311", "mod_date": "2017-08-29", "pub_date": "2014-06-28", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ibm marketing platform 9.1 before fp2 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ibm marketing platform 9.1 before fp2 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-06-28\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2016-6731", "mod_date": "2016-11-28", "pub_date": "2016-11-25", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the nvidia gpu driver in android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. android id: a-30906023. references: nvidia n-cve-2016-6731.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the nvidia gpu driver in android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. android id: a-30906023. references: nvidia n-cve-2016-6731.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-25\n- Last Modified Date: 2016-11-28" } ] }, { "Unnamed: 0": "CVE-2015-6829", "mod_date": "2015-09-17", "pub_date": "2015-09-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the getip function in wp-limit-login-attempts.php in the wp limit login attempts plugin before 2.0.1 for wordpress allow remote attackers to execute arbitrary sql commands via the (1) x-forwarded-for or (2) client-ip http header.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the getip function in wp-limit-login-attempts.php in the wp limit login attempts plugin before 2.0.1 for wordpress allow remote attackers to execute arbitrary sql commands via the (1) x-forwarded-for or (2) client-ip http header.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-09-16\n- Last Modified Date: 2015-09-17" } ] }, { "Unnamed: 0": "CVE-2016-8445", "mod_date": "2017-01-24", "pub_date": "2017-01-12", "cvss": 7.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in mediatek components, including the thermal driver and video driver, could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: n/a. android id: a-31747590. references: mt-alps02968983.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in mediatek components, including the thermal driver and video driver, could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: n/a. android id: a-31747590. references: mt-alps02968983.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-01-12\n- Last Modified Date: 2017-01-24" } ] }, { "Unnamed: 0": "CVE-2017-0458", "mod_date": "2019-10-03", "pub_date": "2017-03-08", "cvss": 7.6, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "an elevation of privilege vulnerability in the qualcomm camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.18. android id: a-32588962. references: qc-cr#1089433.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Improper Input Validation\n- Summary: an elevation of privilege vulnerability in the qualcomm camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.18. android id: a-32588962. references: qc-cr#1089433.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-03-08\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2013-5409", "mod_date": "2017-08-29", "pub_date": "2013-12-21", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in ibm sterling b2b integrator 5.2 and sterling file gateway 2.2 allow remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in ibm sterling b2b integrator 5.2 and sterling file gateway 2.2 allow remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-12-21\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2011-2751", "mod_date": "2011-07-19", "pub_date": "2011-07-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in parodia before 6.809 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in parodia before 6.809 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-07-17\n- Last Modified Date: 2011-07-19" } ] }, { "Unnamed: 0": "CVE-2006-0200", "mod_date": "2018-10-30", "pub_date": "2006-01-13", "cvss": 9.3, "cwe_code": 134, "cwe_name": " Use of Externally-Controlled Format String", "summary": "format string vulnerability in the error-reporting feature in the mysqli extension in php 5.1.0 and 5.1.1 might allow remote attackers to execute arbitrary code via format string specifiers in mysql error messages.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Use of Externally-Controlled Format String." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 134:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 9.3\n- CWE Name: Use of Externally-Controlled Format String\n- Summary: format string vulnerability in the error-reporting feature in the mysqli extension in php 5.1.0 and 5.1.1 might allow remote attackers to execute arbitrary code via format string specifiers in mysql error messages.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2006-01-13\n- Last Modified Date: 2018-10-30" } ] }, { "Unnamed: 0": "CVE-2008-1869", "mod_date": "2017-09-29", "pub_date": "2008-04-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in site sift listings allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php. note: this issue might be site-specific.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in site sift listings allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php. note: this issue might be site-specific.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-4507", "mod_date": "2016-07-08", "pub_date": "2016-07-06", "cvss": 5.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in rexroth bosch bladecontrol-webvis 3.0.2 and earlier allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in rexroth bosch bladecontrol-webvis 3.0.2 and earlier allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/NONE\n- Published Date: 2016-07-06\n- Last Modified Date: 2016-07-08" } ] }, { "Unnamed: 0": "CVE-2007-5408", "mod_date": "2017-09-29", "pub_date": "2007-10-12", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in category.php in cpdynalinks 1.02 allows remote attackers to execute arbitrary sql commands via the category parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in category.php in cpdynalinks 1.02 allows remote attackers to execute arbitrary sql commands via the category parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-10-12\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-5609", "mod_date": "2019-03-19", "pub_date": "2017-01-28", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in include/functions_entries.inc.php in serendipity 2.0.5 allows remote authenticated users to execute arbitrary sql commands via the cat parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in include/functions_entries.inc.php in serendipity 2.0.5 allows remote authenticated users to execute arbitrary sql commands via the cat parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-01-28\n- Last Modified Date: 2019-03-19" } ] }, { "Unnamed: 0": "CVE-2013-3602", "mod_date": "2013-09-06", "pub_date": "2013-09-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admindocumentworker.jsp in coursemill learning management system (lms) 6.6 allows remote authenticated users to execute arbitrary sql commands via the docid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admindocumentworker.jsp in coursemill learning management system (lms) 6.6 allows remote authenticated users to execute arbitrary sql commands via the docid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-09-06\n- Last Modified Date: 2013-09-06" } ] }, { "Unnamed: 0": "CVE-2009-0428", "mod_date": "2017-10-19", "pub_date": "2009-02-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in categorymanager/upload_image_category.asp in dmxready secure document library 1.1 and earlier allows remote attackers to execute arbitrary sql commands via the cid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in categorymanager/upload_image_category.asp in dmxready secure document library 1.1 and earlier allows remote attackers to execute arbitrary sql commands via the cid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-05\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2018-0750", "mod_date": "2018-01-12", "pub_date": "2018-01-04", "cvss": 2.1, "cwe_code": 200, "cwe_name": " Information Exposure", "summary": "the windows gdi component in windows 7 sp1 and windows server 2008 sp2 and r2 sp1 allows an information disclosure vulnerability due to the way objects are handled in memory, aka \"windows elevation of privilege vulnerability\".", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Information Exposure." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 200:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 2.1\n- CWE Name: Information Exposure\n- Summary: the windows gdi component in windows 7 sp1 and windows server 2008 sp2 and r2 sp1 allows an information disclosure vulnerability due to the way objects are handled in memory, aka \"windows elevation of privilege vulnerability\".\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2018-01-04\n- Last Modified Date: 2018-01-12" } ] }, { "Unnamed: 0": "CVE-2017-4943", "mod_date": "2019-10-03", "pub_date": "2017-12-20", "cvss": 7.2, "cwe_code": 787, "cwe_name": " Out-of-bounds Write", "summary": "vmware vcenter server appliance (vcsa) (6.5 before 6.5 u1d) contains a local privilege escalation vulnerability via the 'showlog' plugin. successful exploitation of this issue could result in a low privileged user gaining root level privileges over the appliance base os.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Out-of-bounds Write." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 787:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Out-of-bounds Write\n- Summary: vmware vcenter server appliance (vcsa) (6.5 before 6.5 u1d) contains a local privilege escalation vulnerability via the 'showlog' plugin. successful exploitation of this issue could result in a low privileged user gaining root level privileges over the appliance base os.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-12-20\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2009-3212", "mod_date": "2017-08-17", "pub_date": "2009-09-16", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in vivaprograms infinity script 2.x.x, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the username field.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in vivaprograms infinity script 2.x.x, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the username field.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-16\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2018-4049", "mod_date": "2019-10-10", "pub_date": "2019-04-02", "cvss": 7.2, "cwe_code": 732, "cwe_name": " Incorrect Permission Assignment for Critical Resource", "summary": "an exploitable local privilege elevation vulnerability exists in the file system permissions of gog galaxy's ?games? directory, version 1.2.48.36 (windows 64-bit installer). an attacker can overwrite executables of installed games to exploit this vulnerability and execute arbitrary code with elevated privileges.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 732:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Incorrect Permission Assignment for Critical Resource\n- Summary: an exploitable local privilege elevation vulnerability exists in the file system permissions of gog galaxy's ?games? directory, version 1.2.48.36 (windows 64-bit installer). an attacker can overwrite executables of installed games to exploit this vulnerability and execute arbitrary code with elevated privileges.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-04-02\n- Last Modified Date: 2019-10-10" } ] }, { "Unnamed: 0": "CVE-2008-2380", "mod_date": "2017-08-08", "pub_date": "2008-12-22", "cvss": 5.1, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in authpgsqllib.c in courier-authlib before 0.62.0, when a non-latin locale postgres database is used, allows remote attackers to execute arbitrary sql commands via query parameters containing apostrophes.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.1\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in authpgsqllib.c in courier-authlib before 0.62.0, when a non-latin locale postgres database is used, allows remote attackers to execute arbitrary sql commands via query parameters containing apostrophes.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-22\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2019-15720", "mod_date": "2019-09-03", "pub_date": "2019-08-28", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "cloudberry backup v6.1.2.34 allows local privilege escalation via a pre or post backup action. with only user-level access, a user can modify the backup plan and add a pre backup action script that executes on behalf of nt authority\\system.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: cloudberry backup v6.1.2.34 allows local privilege escalation via a pre or post backup action. with only user-level access, a user can modify the backup plan and add a pre backup action script that executes on behalf of nt authority\\system.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-08-28\n- Last Modified Date: 2019-09-03" } ] }, { "Unnamed: 0": "CVE-2016-7238", "mod_date": "2018-10-12", "pub_date": "2016-11-10", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 mishandle caching for ntlm password-change requests, which allows local users to gain privileges via a crafted application, aka \"windows ntlm elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 mishandle caching for ntlm password-change requests, which allows local users to gain privileges via a crafted application, aka \"windows ntlm elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-10\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2016-2034", "mod_date": "2017-06-14", "pub_date": "2017-06-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in clearpass policy manager 6.5.x through 6.5.6 and 6.6.0.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in clearpass policy manager 6.5.x through 6.5.6 and 6.6.0.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-06-08\n- Last Modified Date: 2017-06-14" } ] }, { "Unnamed: 0": "CVE-2010-4144", "mod_date": "2017-08-17", "pub_date": "2010-11-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in radyo.asp in kisisel radyo script allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in radyo.asp in kisisel radyo script allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-11-02\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2008-2627", "mod_date": "2017-09-29", "pub_date": "2008-06-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the idoblog (com_idoblog) component b24 and earlier and 1.0, a component for joomla!, allows remote attackers to execute arbitrary sql commands via the userid parameter in a userblog action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the idoblog (com_idoblog) component b24 and earlier and 1.0, a component for joomla!, allows remote attackers to execute arbitrary sql commands via the userid parameter in a userblog action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-10\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-15103", "mod_date": "2019-10-09", "pub_date": "2017-12-18", "cvss": 9.0, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "a security-check flaw was found in the way the heketi 5 server api handled user requests. an authenticated heketi user could send specially crafted requests to the heketi server, resulting in remote command execution as the user running heketi server and possibly privilege escalation.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.0\n- CWE Name: Improper Input Validation\n- Summary: a security-check flaw was found in the way the heketi 5 server api handled user requests. an authenticated heketi user could send specially crafted requests to the heketi server, resulting in remote command execution as the user running heketi server and possibly privilege escalation.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-12-18\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2013-0140", "mod_date": "2017-11-16", "pub_date": "2013-05-01", "cvss": 7.9, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the agent-handler component in mcafee epolicy orchestrator (epo) before 4.5.7 and 4.6.x before 4.6.6 allows remote attackers to execute arbitrary sql commands via a crafted request over the agent-server communication channel.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "ADJACENT_NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.9\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the agent-handler component in mcafee epolicy orchestrator (epo) before 4.5.7 and 4.6.x before 4.6.6 allows remote attackers to execute arbitrary sql commands via a crafted request over the agent-server communication channel.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: ADJACENT_NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2013-05-01\n- Last Modified Date: 2017-11-16" } ] }, { "Unnamed: 0": "CVE-2019-14348", "mod_date": "2019-08-09", "pub_date": "2019-08-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the beardev joomsport plugin 3.3 for wordpress allows sql injection to steal, modify, or delete database information via the joomsport_season/new-yorkers/?action=playerlist sid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the beardev joomsport plugin 3.3 for wordpress allows sql injection to steal, modify, or delete database information via the joomsport_season/new-yorkers/?action=playerlist sid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-05\n- Last Modified Date: 2019-08-09" } ] }, { "Unnamed: 0": "CVE-2008-5293", "mod_date": "2017-09-29", "pub_date": "2008-12-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in webstudio ehotel allows remote attackers to execute arbitrary sql commands via the pageid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in webstudio ehotel allows remote attackers to execute arbitrary sql commands via the pageid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-01\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-4043", "mod_date": "2017-09-29", "pub_date": "2008-09-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in aj square aj hyip acme allow remote attackers to execute arbitrary sql commands via the artid parameter to (1) acme/article/comment.php and (2) prime/article/comment.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in aj square aj hyip acme allow remote attackers to execute arbitrary sql commands via the artid parameter to (1) acme/article/comment.php and (2) prime/article/comment.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-11\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-1009", "mod_date": "2010-03-22", "pub_date": "2010-03-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the educator extension 0.1.5 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the educator extension 0.1.5 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-19\n- Last Modified Date: 2010-03-22" } ] }, { "Unnamed: 0": "CVE-2009-1764", "mod_date": "2017-09-29", "pub_date": "2009-05-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in inc/ajax.asp in maxcms 2.0 allows remote attackers to execute arbitrary sql commands via the id parameter in a digg action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in inc/ajax.asp in maxcms 2.0 allows remote attackers to execute arbitrary sql commands via the id parameter in a digg action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-18550", "mod_date": "2018-12-04", "pub_date": "2018-10-21", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "serverscheck monitoring software before 14.3.4 allows sql injection by an authenticated user.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: serverscheck monitoring software before 14.3.4 allows sql injection by an authenticated user.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-10-21\n- Last Modified Date: 2018-12-04" } ] }, { "Unnamed: 0": "CVE-2008-6981", "mod_date": "2018-10-11", "pub_date": "2009-08-19", "cvss": 5.0, "cwe_code": 200, "cwe_name": " Information Exposure", "summary": "index.php in phpadultsite cms, possibly 2.3.2, allows remote attackers to obtain the full installation path via an invalid results_per_page parameter, which leaks the path in an error message. note: this issue might be resultant from a separate sql injection vulnerability.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Information Exposure." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 200:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Information Exposure\n- Summary: index.php in phpadultsite cms, possibly 2.3.2, allows remote attackers to obtain the full installation path via an invalid results_per_page parameter, which leaks the path in an error message. note: this issue might be resultant from a separate sql injection vulnerability.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2009-08-19\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2008-0785", "mod_date": "2018-10-15", "pub_date": "2008-02-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allow remote authenticated users to execute arbitrary sql commands via the (1) graph_list parameter to graph_view.php, (2) leaf_id and id parameters to tree.php, (3) local_graph_id parameter to graph_xport.php, and (4) login_username parameter to index.php/login.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allow remote authenticated users to execute arbitrary sql commands via the (1) graph_list parameter to graph_view.php, (2) leaf_id and id parameters to tree.php, (3) local_graph_id parameter to graph_xport.php, and (4) login_username parameter to index.php/login.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-14\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2019-4032", "mod_date": "2019-10-09", "pub_date": "2019-03-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "ibm financial transaction manager for digital payments for multi-platform 3.1.0 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-forceid: 155998.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ibm financial transaction manager for digital payments for multi-platform 3.1.0 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-forceid: 155998.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-03-05\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2017-9463", "mod_date": "2017-06-19", "pub_date": "2017-06-14", "cvss": 4.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the application piwigo is affected by a sql injection vulnerability in version 2.9.0 and possibly prior. this vulnerability allows remote authenticated attackers to obtain information in the context of the user used by the application to retrieve data from the database. the user_list_backend.php component is affected: values of the idisplaystart & idisplaylength parameters are not sanitized; these are used to construct a sql query and retrieve a list of registered users into the application.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the application piwigo is affected by a sql injection vulnerability in version 2.9.0 and possibly prior. this vulnerability allows remote authenticated attackers to obtain information in the context of the user used by the application to retrieve data from the database. the user_list_backend.php component is affected: values of the idisplaystart & idisplaylength parameters are not sanitized; these are used to construct a sql query and retrieve a list of registered users into the application.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-06-14\n- Last Modified Date: 2017-06-19" } ] }, { "Unnamed: 0": "CVE-2014-1401", "mod_date": "2018-10-09", "pub_date": "2014-02-11", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in auracms 2.3 and earlier allow remote authenticated users to execute arbitrary sql commands via the (1) search parameter to mod/content/content.php or (2) client_ip, (3) x_forwarded_for, (4) x_forwarded, (5) forwarded_for, or (6) forwarded http header to index.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in auracms 2.3 and earlier allow remote authenticated users to execute arbitrary sql commands via the (1) search parameter to mod/content/content.php or (2) client_ip, (3) x_forwarded_for, (4) x_forwarded, (5) forwarded_for, or (6) forwarded http header to index.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-02-11\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2014-9435", "mod_date": "2015-01-05", "pub_date": "2015-01-02", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in absolut engine 1.73 allow remote authenticated users to execute arbitrary sql commands via the (1) sectionid parameter to admin/managersection.php, (2) userid parameter to admin/edituser.php, (3) username parameter to admin/admin.php, or (4) title parameter to admin/managerrelated.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in absolut engine 1.73 allow remote authenticated users to execute arbitrary sql commands via the (1) sectionid parameter to admin/managersection.php, (2) userid parameter to admin/edituser.php, (3) username parameter to admin/admin.php, or (4) title parameter to admin/managerrelated.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-02\n- Last Modified Date: 2015-01-05" } ] }, { "Unnamed: 0": "CVE-2016-3305", "mod_date": "2019-05-15", "pub_date": "2016-09-14", "cvss": 4.6, "cwe_code": 19, "cwe_name": " Data Processing Errors", "summary": "the kernel in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 mishandles session objects, which allows local users to hijack sessions, and consequently gain privileges, via a crafted application, aka \"windows session object elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3306.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Data Processing Errors." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 19:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Data Processing Errors\n- Summary: the kernel in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 mishandles session objects, which allows local users to hijack sessions, and consequently gain privileges, via a crafted application, aka \"windows session object elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3306.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-09-14\n- Last Modified Date: 2019-05-15" } ] }, { "Unnamed: 0": "CVE-2010-4987", "mod_date": "2017-08-29", "pub_date": "2011-11-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in default.asp in kmsoft guestbook (aka gbook) allows remote attackers to execute arbitrary sql commands via the p parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in default.asp in kmsoft guestbook (aka gbook) allows remote attackers to execute arbitrary sql commands via the p parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-01\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2010-4991", "mod_date": "2017-08-29", "pub_date": "2011-11-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the ninjamonials (com_ninjamonials) component for joomla! allows remote attackers to execute arbitrary sql commands via the itemid parameter in a display action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the ninjamonials (com_ninjamonials) component for joomla! allows remote attackers to execute arbitrary sql commands via the itemid parameter in a display action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-01\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-4738", "mod_date": "2017-09-29", "pub_date": "2008-10-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in gallery.php in mycard 1.0.2 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in gallery.php in mycard 1.0.2 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2005-4349", "mod_date": "2018-10-19", "pub_date": "2005-12-19", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "** disputed ** sql injection vulnerability in server_privileges.php in phpmyadmin 2.7.0 allows remote authenticated users to execute arbitrary sql commands via the (1) dbname and (2) checkprivs parameters. note: the vendor and a third party have disputed this issue, saying that the main task of the program is to support query execution by authenticated users, and no external attack scenario exists without an auto-login configuration. thus it is likely that this issue will be rejected. however, a closely related csrf issue has been assigned cve-2005-4450.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ** disputed ** sql injection vulnerability in server_privileges.php in phpmyadmin 2.7.0 allows remote authenticated users to execute arbitrary sql commands via the (1) dbname and (2) checkprivs parameters. note: the vendor and a third party have disputed this issue, saying that the main task of the program is to support query execution by authenticated users, and no external attack scenario exists without an auto-login configuration. thus it is likely that this issue will be rejected. however, a closely related csrf issue has been assigned cve-2005-4450.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-12-19\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2011-3831", "mod_date": "2017-08-29", "pub_date": "2012-01-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in incident_attachments.php in support incident tracker (aka sit!) 3.65 allows remote attackers to execute arbitrary sql commands via an uploaded file with a crafted file name.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in incident_attachments.php in support incident tracker (aka sit!) 3.65 allows remote attackers to execute arbitrary sql commands via an uploaded file with a crafted file name.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-01-29\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2018-0152", "mod_date": "2019-10-09", "pub_date": "2018-03-28", "cvss": 9.0, "cwe_code": 613, "cwe_name": " Insufficient Session Expiration", "summary": "a vulnerability in the web-based user interface (web ui) of cisco ios xe software could allow an authenticated, remote attacker to gain elevated privileges on an affected device. the vulnerability exists because the affected software does not reset the privilege level for each web ui session. an attacker who has valid credentials for an affected device could exploit this vulnerability by remotely accessing a vty line to the device. a successful exploit could allow the attacker to access an affected device with the privileges of the user who previously logged in to the web ui. this vulnerability affects cisco devices that are running a vulnerable release of cisco ios xe software, if the http server feature is enabled and authentication, authorization, and accounting (aaa) authorization is not configured for exec sessions. the default state of the http server feature is version-dependent. this vulnerability was introduced in cisco ios xe software release 16.1.1. cisco bug ids: cscvf71769.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Insufficient Session Expiration." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 613:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.0\n- CWE Name: Insufficient Session Expiration\n- Summary: a vulnerability in the web-based user interface (web ui) of cisco ios xe software could allow an authenticated, remote attacker to gain elevated privileges on an affected device. the vulnerability exists because the affected software does not reset the privilege level for each web ui session. an attacker who has valid credentials for an affected device could exploit this vulnerability by remotely accessing a vty line to the device. a successful exploit could allow the attacker to access an affected device with the privileges of the user who previously logged in to the web ui. this vulnerability affects cisco devices that are running a vulnerable release of cisco ios xe software, if the http server feature is enabled and authentication, authorization, and accounting (aaa) authorization is not configured for exec sessions. the default state of the http server feature is version-dependent. this vulnerability was introduced in cisco ios xe software release 16.1.1. cisco bug ids: cscvf71769.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-03-28\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2016-7508", "mod_date": "2017-08-12", "pub_date": "2017-06-21", "cvss": 6.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in glpi 0.90.4 allow an authenticated remote attacker to execute arbitrary sql commands by using a certain character when the database is configured to use big5 asian encoding.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in glpi 0.90.4 allow an authenticated remote attacker to execute arbitrary sql commands by using a certain character when the database is configured to use big5 asian encoding.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-06-21\n- Last Modified Date: 2017-08-12" } ] }, { "Unnamed: 0": "CVE-2015-0011", "mod_date": "2018-10-12", "pub_date": "2015-01-13", "cvss": 4.7, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "mrxdav.sys (aka the webdav driver) in the kernel-mode drivers in microsoft windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 allows local users to bypass an impersonation protection mechanism, and obtain privileges for redirection of webdav requests, via a crafted application, aka \"webdav elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.7\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: mrxdav.sys (aka the webdav driver) in the kernel-mode drivers in microsoft windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 allows local users to bypass an impersonation protection mechanism, and obtain privileges for redirection of webdav requests, via a crafted application, aka \"webdav elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): NONE/COMPLETE/NONE\n- Published Date: 2015-01-13\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2012-5310", "mod_date": "2017-08-29", "pub_date": "2012-10-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the wp e-commerce plugin before 3.8.7.6 for wordpress allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the wp e-commerce plugin before 3.8.7.6 for wordpress allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-10-08\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2017-17590", "mod_date": "2017-12-20", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "fs stackoverflow clone 1.0 has sql injection via the /question keywords parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: fs stackoverflow clone 1.0 has sql injection via the /question keywords parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-20" } ] }, { "Unnamed: 0": "CVE-2014-5262", "mod_date": "2017-09-08", "pub_date": "2014-08-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the graph settings script (graph_settings.php) in cacti 0.8.8b and earlier allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the graph settings script (graph_settings.php) in cacti 0.8.8b and earlier allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-08-22\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2017-0729", "mod_date": "2019-10-03", "pub_date": "2017-08-09", "cvss": 6.8, "cwe_code": 190, "cwe_name": " Integer Overflow or Wraparound", "summary": "a elevation of privilege vulnerability in the android media framework (mediadrmserver). product: android. versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-37710346.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Integer Overflow or Wraparound." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 190:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Integer Overflow or Wraparound\n- Summary: a elevation of privilege vulnerability in the android media framework (mediadrmserver). product: android. versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-37710346.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-08-09\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2010-0608", "mod_date": "2010-02-12", "pub_date": "2010-02-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in novaboard 1.1.2 allows remote attackers to execute arbitrary sql commands via the forums[] parameter in a search action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in novaboard 1.1.2 allows remote attackers to execute arbitrary sql commands via the forums[] parameter in a search action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-02-11\n- Last Modified Date: 2010-02-12" } ] }, { "Unnamed: 0": "CVE-2011-5039", "mod_date": "2017-08-29", "pub_date": "2011-12-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in infoproject biznis heroj allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters to login.php, (3) the filter parameter to widget.dokumenti_lista.php, and (4) the fin_nalog_id parameter to nalozi_naslov.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in infoproject biznis heroj allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters to login.php, (3) the filter parameter to widget.dokumenti_lista.php, and (4) the fin_nalog_id parameter to nalozi_naslov.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-12-30\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2016-7255", "mod_date": "2018-10-12", "pub_date": "2016-11-10", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-10\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2012-1071", "mod_date": "2017-08-29", "pub_date": "2012-02-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the kitchen recipe (mv_cooking) extension before 0.4.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors, as exploited in the wild as of february 2012.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the kitchen recipe (mv_cooking) extension before 0.4.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors, as exploited in the wild as of february 2012.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-02-14\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-5486", "mod_date": "2017-09-29", "pub_date": "2008-12-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin.php in turnkeyforms text link sales allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin.php in turnkeyforms text link sales allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-12\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-4733", "mod_date": "2017-09-19", "pub_date": "2010-03-18", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in checkuser.php in simpleloginsys 0.5, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the username parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in checkuser.php in simpleloginsys 0.5, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the username parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-18\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2007-6091", "mod_date": "2018-10-15", "pub_date": "2007-11-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in files/login.asp in jiro's banner system (jbs) 2.0, and possibly jiro's upload manager (aka jiro's upload system or jus), allow remote attackers to execute arbitrary sql commands via the (1) username (aka login or email) or (2) password field.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in files/login.asp in jiro's banner system (jbs) 2.0, and possibly jiro's upload manager (aka jiro's upload system or jus), allow remote attackers to execute arbitrary sql commands via the (1) username (aka login or email) or (2) password field.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-11-22\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2015-9333", "mod_date": "2019-09-30", "pub_date": "2019-08-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the cforms2 plugin before 14.6.10 for wordpress has sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the cforms2 plugin before 14.6.10 for wordpress has sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-22\n- Last Modified Date: 2019-09-30" } ] }, { "Unnamed: 0": "CVE-2008-4328", "mod_date": "2018-10-11", "pub_date": "2008-09-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in site_search.php in easyrealtorpro 2008 allows remote attackers to execute arbitrary sql commands via the (1) item, (2) search_ordermethod, and (3) search_order parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in site_search.php in easyrealtorpro 2008 allows remote attackers to execute arbitrary sql commands via the (1) item, (2) search_ordermethod, and (3) search_order parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-30\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2011-3838", "mod_date": "2017-08-29", "pub_date": "2011-12-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in wuzly 2.0 allow remote attackers to execute arbitrary sql commands via the (1) u parameter to fp.php, (2) epage parameter to newpage.php, (3) epost parameter to newpost.php, and (4) username parameter to login.php in admin/; or the (5) username parameter to mobile/login.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in wuzly 2.0 allow remote attackers to execute arbitrary sql commands via the (1) u parameter to fp.php, (2) epage parameter to newpage.php, (3) epost parameter to newpost.php, and (4) username parameter to login.php in admin/; or the (5) username parameter to mobile/login.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-12-24\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2018-19435", "mod_date": "2018-12-18", "pub_date": "2018-11-22", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in the sales component in weberp 4.15. salesinquiry.php has sql injection via the sortby parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in the sales component in weberp 4.15. salesinquiry.php has sql injection via the sortby parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-11-22\n- Last Modified Date: 2018-12-18" } ] }, { "Unnamed: 0": "CVE-2014-3934", "mod_date": "2014-06-03", "pub_date": "2014-06-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the submit_news module for php-nuke 8.3 allows remote attackers to execute arbitrary sql commands via the topics[] parameter to modules.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the submit_news module for php-nuke 8.3 allows remote attackers to execute arbitrary sql commands via the topics[] parameter to modules.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-06-02\n- Last Modified Date: 2014-06-03" } ] }, { "Unnamed: 0": "CVE-2018-19513", "mod_date": "2019-03-22", "pub_date": "2019-03-21", "cvss": 5.0, "cwe_code": 532, "cwe_name": " Inclusion of Sensitive Information in Log Files", "summary": "in webgalamb through 7.0, log files are exposed to the internet with predictable files/logs/sql_error_log/yyyy-mm-dd-sql_error_log.log filenames. the log file could contain sensitive client data (email addresses) and also facilitates exploitation of sql injection errors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Inclusion of Sensitive Information in Log Files." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 532:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Inclusion of Sensitive Information in Log Files\n- Summary: in webgalamb through 7.0, log files are exposed to the internet with predictable files/logs/sql_error_log/yyyy-mm-dd-sql_error_log.log filenames. the log file could contain sensitive client data (email addresses) and also facilitates exploitation of sql injection errors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2019-03-21\n- Last Modified Date: 2019-03-22" } ] }, { "Unnamed: 0": "CVE-2018-7735", "mod_date": "2018-03-26", "pub_date": "2018-03-06", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "afian filerun (before 2018.02.13) suffers from a remote sql injection vulnerability, when logged in as superuser, via the search parameter in a /?module=metadata§ion=cpanel&page=list_filetypes request.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: afian filerun (before 2018.02.13) suffers from a remote sql injection vulnerability, when logged in as superuser, via the search parameter in a /?module=metadata§ion=cpanel&page=list_filetypes request.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-03-06\n- Last Modified Date: 2018-03-26" } ] }, { "Unnamed: 0": "CVE-2019-14254", "mod_date": "2019-09-19", "pub_date": "2019-09-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in the secure portal in publisure 2.1.2. because sql queries are not well sanitized, there are multiple sql injections in useraccfunctions.php functions. using this, an attacker can access passwords and/or grant access to the user account \"user\" in order to become \"administrator\" (for example).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in the secure portal in publisure 2.1.2. because sql queries are not well sanitized, there are multiple sql injections in useraccfunctions.php functions. using this, an attacker can access passwords and/or grant access to the user account \"user\" in order to become \"administrator\" (for example).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-18\n- Last Modified Date: 2019-09-19" } ] }, { "Unnamed: 0": "CVE-2006-6337", "mod_date": "2018-10-17", "pub_date": "2006-12-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in giris.asp in aspee and dogantepe ziyaretci defteri allow remote attackers to execute arbitrary sql commands via the (1) kullanici or (2) parola parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in giris.asp in aspee and dogantepe ziyaretci defteri allow remote attackers to execute arbitrary sql commands via the (1) kullanici or (2) parola parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-12-07\n- Last Modified Date: 2018-10-17" } ] }, { "Unnamed: 0": "CVE-2002-2304", "mod_date": "2017-07-29", "pub_date": "2002-12-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/auth/checksession.php in myphplinks 2.1.9 and 2.2.0 allows remote attackers to execute arbitrary sql commands via the idsession parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/auth/checksession.php in myphplinks 2.1.9 and 2.2.0 allows remote attackers to execute arbitrary sql commands via the idsession parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2002-12-31\n- Last Modified Date: 2017-07-29" } ] }, { "Unnamed: 0": "CVE-2008-1460", "mod_date": "2017-09-29", "pub_date": "2008-03-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the joovideo (com_joovideo) 1.0 and 1.2.2 component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the joovideo (com_joovideo) 1.0 and 1.2.2 component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-8057", "mod_date": "2019-02-28", "pub_date": "2018-03-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability exists in western bridge cobub razor 0.8.0 via the channel_name or platform parameter in a /index.php?/manage/channel/addchannel request, related to /application/controllers/manage/channel.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability exists in western bridge cobub razor 0.8.0 via the channel_name or platform parameter in a /index.php?/manage/channel/addchannel request, related to /application/controllers/manage/channel.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-03-11\n- Last Modified Date: 2019-02-28" } ] }, { "Unnamed: 0": "CVE-2007-3637", "mod_date": "2008-11-15", "pub_date": "2007-07-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in mkportal 1.1.1 allows remote attackers to execute arbitrary sql commands via unspecified vectors, aka zd-00000008. this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. a cve has been assigned for tracking purposes, but duplicates with other cves are difficult to determine.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in mkportal 1.1.1 allows remote attackers to execute arbitrary sql commands via unspecified vectors, aka zd-00000008. this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. a cve has been assigned for tracking purposes, but duplicates with other cves are difficult to determine.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-07-10\n- Last Modified Date: 2008-11-15" } ] }, { "Unnamed: 0": "CVE-2005-1500", "mod_date": "2017-07-11", "pub_date": "2005-05-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in mybloggie 2.1.1 allow remote attackers to execute arbitrary sql commands via (1) the keyword parameter in search.php; or (2) the date_no parameter in viewdate mode, (3) the cat_id parameter in viewcat mode, the (4) month_no or (5) year parameter in viewmonth mode, or (6) post_id parameter in viewid mode to index.php. note: item (1) was discovered to affect 2.1.3 as well.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in mybloggie 2.1.1 allow remote attackers to execute arbitrary sql commands via (1) the keyword parameter in search.php; or (2) the date_no parameter in viewdate mode, (3) the cat_id parameter in viewcat mode, the (4) month_no or (5) year parameter in viewmonth mode, or (6) post_id parameter in viewid mode to index.php. note: item (1) was discovered to affect 2.1.3 as well.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-05-11\n- Last Modified Date: 2017-07-11" } ] }, { "Unnamed: 0": "CVE-2010-4940", "mod_date": "2017-08-29", "pub_date": "2011-10-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in wanewsletter 2.1.2 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in wanewsletter 2.1.2 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-10-09\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2016-6272", "mod_date": "2018-03-17", "pub_date": "2018-02-20", "cvss": 5.0, "cwe_code": 91, "cwe_name": " XML Injection (aka Blind XPath Injection)", "summary": "xpath injection vulnerability in epic mychart allows remote attackers to access contents of an xml document containing static display strings, such as field labels, via the topic parameter to help.asp. note: this was originally reported as a sql injection vulnerability, but this may be inaccurate.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: XML Injection (aka Blind XPath Injection)." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 91:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: XML Injection (aka Blind XPath Injection)\n- Summary: xpath injection vulnerability in epic mychart allows remote attackers to access contents of an xml document containing static display strings, such as field labels, via the topic parameter to help.asp. note: this was originally reported as a sql injection vulnerability, but this may be inaccurate.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2018-02-20\n- Last Modified Date: 2018-03-17" } ] }, { "Unnamed: 0": "CVE-2018-18801", "mod_date": "2018-12-18", "pub_date": "2018-11-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the bsen ordering software 1.0 has sql injection via student/index.php?view=view&id=[sql] or index.php?q=single-item&id=[sql].", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the bsen ordering software 1.0 has sql injection via student/index.php?view=view&id=[sql] or index.php?q=single-item&id=[sql].\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-11-16\n- Last Modified Date: 2018-12-18" } ] }, { "Unnamed: 0": "CVE-2007-5976", "mod_date": "2017-07-29", "pub_date": "2007-11-15", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in db_create.php in phpmyadmin before 2.11.2.1 allows remote authenticated users with create database privileges to execute arbitrary sql commands via the db parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in db_create.php in phpmyadmin before 2.11.2.1 allows remote authenticated users with create database privileges to execute arbitrary sql commands via the db parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-11-15\n- Last Modified Date: 2017-07-29" } ] }, { "Unnamed: 0": "CVE-2015-3416", "mod_date": "2018-07-19", "pub_date": "2015-04-24", "cvss": 7.5, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "the sqlite3vxprintf function in printf.c in sqlite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a select statement.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: the sqlite3vxprintf function in printf.c in sqlite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a select statement.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-04-24\n- Last Modified Date: 2018-07-19" } ] }, { "Unnamed: 0": "CVE-2019-1770", "mod_date": "2019-10-09", "pub_date": "2019-05-15", "cvss": 7.2, "cwe_code": 78, "cwe_name": " Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", "summary": "a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands on the underlying linux operating system with the privilege level of root. the vulnerability is due to insufficient validation of arguments passed to a specific cli command on the affected device. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying linux operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 78:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\n- Summary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands on the underlying linux operating system with the privilege level of root. the vulnerability is due to insufficient validation of arguments passed to a specific cli command on the affected device. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying linux operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-05-15\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2008-4660", "mod_date": "2017-08-08", "pub_date": "2008-10-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the m1 intern (m1_intern) 1.0.0 extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the m1 intern (m1_intern) 1.0.0 extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-22\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2016-0095", "mod_date": "2018-10-12", "pub_date": "2016-03-09", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel-mode driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0093, cve-2016-0094, and cve-2016-0096.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel-mode driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0093, cve-2016-0094, and cve-2016-0096.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-03-09\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2010-1365", "mod_date": "2010-04-14", "pub_date": "2010-04-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in uiga fan club, as downloaded on 20100310, allows remote attackers to execute arbitrary sql commands via the id parameter in a photos action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in uiga fan club, as downloaded on 20100310, allows remote attackers to execute arbitrary sql commands via the id parameter in a photos action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-13\n- Last Modified Date: 2010-04-14" } ] }, { "Unnamed: 0": "CVE-2009-0479", "mod_date": "2009-02-09", "pub_date": "2009-02-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in admin/admin_login.php in online grades 3.2.4 allow remote attackers to execute arbitrary sql commands via the (1) uname or (2) pword parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in admin/admin_login.php in online grades 3.2.4 allow remote attackers to execute arbitrary sql commands via the (1) uname or (2) pword parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-09\n- Last Modified Date: 2009-02-09" } ] }, { "Unnamed: 0": "CVE-2010-1886", "mod_date": "2018-10-30", "pub_date": "2010-08-16", "cvss": 6.8, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 sp2 and r2, and windows 7 allow local users to gain privileges by leveraging access to a process with networkservice credentials, as demonstrated by tapi server, sql server, and iis processes, and related to the windows service isolation feature. note: the vendor states that privilege escalation from networkservice to localsystem does not cross a \"security boundary.\"", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 sp2 and r2, and windows 7 allow local users to gain privileges by leveraging access to a process with networkservice credentials, as demonstrated by tapi server, sql server, and iis processes, and related to the windows service isolation feature. note: the vendor states that privilege escalation from networkservice to localsystem does not cross a \"security boundary.\"\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2010-08-16\n- Last Modified Date: 2018-10-30" } ] }, { "Unnamed: 0": "CVE-2008-6409", "mod_date": "2017-09-29", "pub_date": "2009-03-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in ol'bookmarks manager 0.7.5 allows remote attackers to execute arbitrary sql commands via the id parameter in a brain action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in ol'bookmarks manager 0.7.5 allows remote attackers to execute arbitrary sql commands via the id parameter in a brain action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-6614", "mod_date": "2017-09-29", "pub_date": "2009-04-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in microcms-admin-login.php in implied by design (ibd) micro cms 3.5 (aka 0.3.5) allow remote attackers to execute arbitrary sql commands via (1) the administrators_username parameter (aka the username field) or (2) the administrators_pass parameter (aka the password field).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in microcms-admin-login.php in implied by design (ibd) micro cms 3.5 (aka 0.3.5) allow remote attackers to execute arbitrary sql commands via (1) the administrators_username parameter (aka the username field) or (2) the administrators_pass parameter (aka the password field).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2011-1480", "mod_date": "2018-08-13", "pub_date": "2011-06-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin.php in the administration backend in francisco burzi php-nuke 8.0 and earlier allows remote attackers to execute arbitrary sql commands via the chng_uid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin.php in the administration backend in francisco burzi php-nuke 8.0 and earlier allows remote attackers to execute arbitrary sql commands via the chng_uid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-06-21\n- Last Modified Date: 2018-08-13" } ] }, { "Unnamed: 0": "CVE-2019-10123", "mod_date": "2019-06-03", "pub_date": "2019-05-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection in advanced infodata systems (ais) esel-server 67 (which is the backend for the ais logistics mobile app) allows an anonymous attacker to execute arbitrary code in the context of the user of the mssql database. the default user for the database is the 'sa' user.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection in advanced infodata systems (ais) esel-server 67 (which is the backend for the ais logistics mobile app) allows an anonymous attacker to execute arbitrary code in the context of the user of the mssql database. the default user for the database is the 'sa' user.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-05-31\n- Last Modified Date: 2019-06-03" } ] }, { "Unnamed: 0": "CVE-2008-1065", "mod_date": "2008-09-05", "pub_date": "2008-02-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in index.php in the xm-memberstats (xmmemberstats) 2.0e module for xoops allow remote attackers to execute arbitrary sql commands via the (1) letter or (2) sortby parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in index.php in the xm-memberstats (xmmemberstats) 2.0e module for xoops allow remote attackers to execute arbitrary sql commands via the (1) letter or (2) sortby parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-28\n- Last Modified Date: 2008-09-05" } ] }, { "Unnamed: 0": "CVE-2009-4899", "mod_date": "2019-11-01", "pub_date": "2019-10-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "pixelpost 1.7.1 has sql injection", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: pixelpost 1.7.1 has sql injection\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-28\n- Last Modified Date: 2019-11-01" } ] }, { "Unnamed: 0": "CVE-2014-3041", "mod_date": "2017-08-29", "pub_date": "2014-08-26", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ibm emptoris contract management 9.5.x before 9.5.0.6 ifix 10, 10.0.0.x before 10.0.0.1 ifix 10, 10.0.1.x before 10.0.1.4, and 10.0.2.x before 10.0.2.2 ifix 2 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ibm emptoris contract management 9.5.x before 9.5.0.6 ifix 10, 10.0.0.x before 10.0.0.1 ifix 10, 10.0.1.x before 10.0.1.4, and 10.0.2.x before 10.0.2.2 ifix 2 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-08-26\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2012-5000", "mod_date": "2017-08-29", "pub_date": "2012-09-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in jokes/index.php in the witze addon 0.9 for dev!l'z clanportal allows remote attackers to execute arbitrary sql commands via the id parameter in a show action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in jokes/index.php in the witze addon 0.9 for dev!l'z clanportal allows remote attackers to execute arbitrary sql commands via the id parameter in a show action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-09-19\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2019-1215", "mod_date": "2019-09-12", "pub_date": "2019-09-11", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists in the way that ws2ifsl.sys (winsock) handles objects in memory, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1253, cve-2019-1278, cve-2019-1303.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists in the way that ws2ifsl.sys (winsock) handles objects in memory, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1253, cve-2019-1278, cve-2019-1303.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-09-11\n- Last Modified Date: 2019-09-12" } ] }, { "Unnamed: 0": "CVE-2016-10943", "mod_date": "2019-09-13", "pub_date": "2019-09-13", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the zx-csv-upload plugin 1 for wordpress has sql injection via the id parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the zx-csv-upload plugin 1 for wordpress has sql injection via the id parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-13\n- Last Modified Date: 2019-09-13" } ] }, { "Unnamed: 0": "CVE-2014-9102", "mod_date": "2014-12-05", "pub_date": "2014-11-26", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the kunena component before 3.0.6 for joomla! allow remote authenticated users to execute arbitrary sql commands via the index value in an array parameter, as demonstrated by the topics[] parameter in an unfavorite action to index.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the kunena component before 3.0.6 for joomla! allow remote authenticated users to execute arbitrary sql commands via the index value in an array parameter, as demonstrated by the topics[] parameter in an unfavorite action to index.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-11-26\n- Last Modified Date: 2014-12-05" } ] }, { "Unnamed: 0": "CVE-2014-9220", "mod_date": "2018-10-30", "pub_date": "2014-12-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in openvas manager before 4.0.6 and 5.x before 5.0.7 allows remote attackers to execute arbitrary sql commands via the timezone parameter in a modify_schedule omp command.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in openvas manager before 4.0.6 and 5.x before 5.0.7 allows remote attackers to execute arbitrary sql commands via the timezone parameter in a modify_schedule omp command.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-12-03\n- Last Modified Date: 2018-10-30" } ] }, { "Unnamed: 0": "CVE-2017-12650", "mod_date": "2017-08-15", "pub_date": "2017-08-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the loginizer plugin before 1.3.6 for wordpress via the x-forwarded-for http header.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the loginizer plugin before 1.3.6 for wordpress via the x-forwarded-for http header.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-08-07\n- Last Modified Date: 2017-08-15" } ] }, { "Unnamed: 0": "CVE-2019-0841", "mod_date": "2019-06-07", "pub_date": "2019-04-09", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists when windows appx deployment service (appxsvc) improperly handles hard links, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-0730, cve-2019-0731, cve-2019-0796, cve-2019-0805, cve-2019-0836.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists when windows appx deployment service (appxsvc) improperly handles hard links, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-0730, cve-2019-0731, cve-2019-0796, cve-2019-0805, cve-2019-0836.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-04-09\n- Last Modified Date: 2019-06-07" } ] }, { "Unnamed: 0": "CVE-2008-6261", "mod_date": "2017-09-29", "pub_date": "2009-02-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in view.php in e-topbiz admanager 4 allows remote attackers to execute arbitrary sql commands via the group parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in view.php in e-topbiz admanager 4 allows remote attackers to execute arbitrary sql commands via the group parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-12372", "mod_date": "2019-05-29", "pub_date": "2019-05-28", "cvss": 4.6, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "petraware ptransformer adc before 2.1.7.22827 allows sql injection via the user id parameter to the login form.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.6\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: petraware ptransformer adc before 2.1.7.22827 allows sql injection via the user id parameter to the login form.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-05-28\n- Last Modified Date: 2019-05-29" } ] }, { "Unnamed: 0": "CVE-2009-2337", "mod_date": "2017-09-19", "pub_date": "2009-07-07", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in includes/module/book/index.inc.php in w3b|cms gaestebuch guestbook module 3.0.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the spam_id parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in includes/module/book/index.inc.php in w3b|cms gaestebuch guestbook module 3.0.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the spam_id parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-07\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-6686", "mod_date": "2017-08-17", "pub_date": "2009-04-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in cooluri (cooluri) 1.0.11 and earlier extension for typo3 allows remote attackers to execute arbitrary sql commands via unknown vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in cooluri (cooluri) 1.0.11 and earlier extension for typo3 allows remote attackers to execute arbitrary sql commands via unknown vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-10\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2016-8423", "mod_date": "2017-01-18", "pub_date": "2017-01-12", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the qualcomm bootloader could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: n/a. android id: a-31399736. references: qc-cr#1000546.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the qualcomm bootloader could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: n/a. android id: a-31399736. references: qc-cr#1000546.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-01-12\n- Last Modified Date: 2017-01-18" } ] }, { "Unnamed: 0": "CVE-2014-5082", "mod_date": "2015-11-04", "pub_date": "2014-08-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in admin/admin.php in sphider 1.3.6 and earlier, sphider pro, and sphider-plus allow remote attackers to execute arbitrary sql commands via the (1) site_id or (2) url parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in admin/admin.php in sphider 1.3.6 and earlier, sphider pro, and sphider-plus allow remote attackers to execute arbitrary sql commands via the (1) site_id or (2) url parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-08-06\n- Last Modified Date: 2015-11-04" } ] }, { "Unnamed: 0": "CVE-2009-2392", "mod_date": "2017-09-19", "pub_date": "2009-07-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in text.php in virtuenetz virtue online test generator allows remote attackers to execute arbitrary sql commands via the tid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in text.php in virtuenetz virtue online test generator allows remote attackers to execute arbitrary sql commands via the tid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-09\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2009-4099", "mod_date": "2017-08-17", "pub_date": "2009-11-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the google calendar gcalendar (com_gcalendar) component 1.1.2, 2.1.4, and possibly earlier versions for joomla! allows remote attackers to execute arbitrary sql commands via the gcid parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the google calendar gcalendar (com_gcalendar) component 1.1.2, 2.1.4, and possibly earlier versions for joomla! allows remote attackers to execute arbitrary sql commands via the gcid parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-11-29\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2008-6887", "mod_date": "2017-08-17", "pub_date": "2009-08-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in detailad.asp in pre classified listings 1.0 allows remote attackers to execute arbitrary sql commands via the siteid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in detailad.asp in pre classified listings 1.0 allows remote attackers to execute arbitrary sql commands via the siteid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-08-03\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2017-15012", "mod_date": "2017-11-03", "pub_date": "2017-10-13", "cvss": 6.5, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "opentext documentum content server (formerly emc documentum content server) through 7.3 does not properly validate the input of the put_file rpc-command, which allows any authenticated user to hijack an arbitrary file from the content server filesystem; because some files on the content server filesystem are security-sensitive, this leads to privilege escalation.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Input Validation\n- Summary: opentext documentum content server (formerly emc documentum content server) through 7.3 does not properly validate the input of the put_file rpc-command, which allows any authenticated user to hijack an arbitrary file from the content server filesystem; because some files on the content server filesystem are security-sensitive, this leads to privilege escalation.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-13\n- Last Modified Date: 2017-11-03" } ] }, { "Unnamed: 0": "CVE-2006-1871", "mod_date": "2018-10-18", "pub_date": "2006-04-20", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in oracle database server 9.2.0.7 and 10.1.0.5 allows remote attackers to execute arbitrary sql commands via the delete_from_table function in the dbms_logmnr_session (log miner) package, aka vuln# db06.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in oracle database server 9.2.0.7 and 10.1.0.5 allows remote attackers to execute arbitrary sql commands via the delete_from_table function in the dbms_logmnr_session (log miner) package, aka vuln# db06.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-04-20\n- Last Modified Date: 2018-10-18" } ] }, { "Unnamed: 0": "CVE-2010-5049", "mod_date": "2018-10-10", "pub_date": "2011-11-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in events.php in zabbix 1.8.1 and earlier allows remote attackers to execute arbitrary sql commands via the nav_time parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in events.php in zabbix 1.8.1 and earlier allows remote attackers to execute arbitrary sql commands via the nav_time parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-23\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2014-10023", "mod_date": "2017-09-08", "pub_date": "2015-01-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in topicsviewer 3.0 beta 1 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) edit_block.php, (2) edit_cat.php, (3) edit_note.php, or (4) rmv_topic.php in admincp/.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in topicsviewer 3.0 beta 1 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) edit_block.php, (2) edit_cat.php, (3) edit_note.php, or (4) rmv_topic.php in admincp/.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-13\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2017-0304", "mod_date": "2018-01-08", "pub_date": "2017-12-21", "cvss": 5.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability exists in the big-ip afm management ui on versions 12.0.0, 12.1.0, 12.1.1, 12.1.2 and 13.0.0 that may allow a copy of the firewall rules to be tampered with and impact the configuration utility until there is a resync of the rules. traffic processing and the live firewall rules in use are not affected.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability exists in the big-ip afm management ui on versions 12.0.0, 12.1.0, 12.1.1, 12.1.2 and 13.0.0 that may allow a copy of the firewall rules to be tampered with and impact the configuration utility until there is a resync of the rules. traffic processing and the live firewall rules in use are not affected.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/NONE\n- Published Date: 2017-12-21\n- Last Modified Date: 2018-01-08" } ] }, { "Unnamed: 0": "CVE-2017-0383", "mod_date": "2019-10-03", "pub_date": "2017-01-12", "cvss": 9.3, "cwe_code": 190, "cwe_name": " Integer Overflow or Wraparound", "summary": "an elevation of privilege vulnerability in the framework apis could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 7.0, 7.1. android id: a-31677614.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Integer Overflow or Wraparound." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 190:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Integer Overflow or Wraparound\n- Summary: an elevation of privilege vulnerability in the framework apis could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 7.0, 7.1. android id: a-31677614.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-01-12\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2009-3343", "mod_date": "2017-09-19", "pub_date": "2009-09-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in details.asp in hotweb rentals allows remote attackers to execute arbitrary sql commands via the propid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in details.asp in hotweb rentals allows remote attackers to execute arbitrary sql commands via the propid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-24\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2011-5140", "mod_date": "2017-08-29", "pub_date": "2012-08-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the blog module 1.0 for diy-cms allow remote attackers to execute arbitrary sql commands via the (1) start parameter to (a) tags.php, (b) list.php, (c) index.php, (d) main_index.php, (e) viewpost.php, (f) archive.php, (g) control/approve_comments.php, (h) control/approve_posts.php, and (i) control/viewcat.php; and the (2) month and (3) year parameters to archive.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the blog module 1.0 for diy-cms allow remote attackers to execute arbitrary sql commands via the (1) start parameter to (a) tags.php, (b) list.php, (c) index.php, (d) main_index.php, (e) viewpost.php, (f) archive.php, (g) control/approve_comments.php, (h) control/approve_posts.php, and (i) control/viewcat.php; and the (2) month and (3) year parameters to archive.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-08-31\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-6241", "mod_date": "2017-09-29", "pub_date": "2009-02-23", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in admin/usercheck.php in flexphpsite 0.0.1 and 0.0.7, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via (1) the checkuser parameter (aka username field), or (2) the checkpass parameter (aka password field), to admin/index.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in admin/usercheck.php in flexphpsite 0.0.1 and 0.0.7, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via (1) the checkuser parameter (aka username field), or (2) the checkpass parameter (aka password field), to admin/index.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-23\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2015-2518", "mod_date": "2019-05-14", "pub_date": "2015-09-09", "cvss": 6.9, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel-mode driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 allows local users to gain privileges via a crafted application, aka \"win32k memory corruption elevation of privilege vulnerability,\" a different vulnerability than cve-2015-2511, cve-2015-2517, and cve-2015-2546.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel-mode driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 allows local users to gain privileges via a crafted application, aka \"win32k memory corruption elevation of privilege vulnerability,\" a different vulnerability than cve-2015-2511, cve-2015-2517, and cve-2015-2546.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-09-09\n- Last Modified Date: 2019-05-14" } ] }, { "Unnamed: 0": "CVE-2009-2148", "mod_date": "2017-09-29", "pub_date": "2009-06-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in news/index.php in campus virtual-lms allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in news/index.php in campus virtual-lms allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-06-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-9184", "mod_date": "2016-11-29", "pub_date": "2016-11-04", "cvss": 5.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "in /framework/modules/core/controllers/exphtmleditorcontroller.php of exponent cms 2.4.0, untrusted input is used to construct a table name, and in the selectobject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for sql injection. impact is information disclosure.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: in /framework/modules/core/controllers/exphtmleditorcontroller.php of exponent cms 2.4.0, untrusted input is used to construct a table name, and in the selectobject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for sql injection. impact is information disclosure.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2016-11-04\n- Last Modified Date: 2016-11-29" } ] }, { "Unnamed: 0": "CVE-2008-6329", "mod_date": "2017-09-29", "pub_date": "2009-02-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in employee/login.asp in pre asp job board allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters, as reachable from employee/emp_login.asp. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in employee/login.asp in pre asp job board allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters, as reachable from employee/emp_login.asp. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-27\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-16850", "mod_date": "2019-10-09", "pub_date": "2018-11-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "postgresql before versions 11.1, 10.6 is vulnerable to a to sql injection in pg_upgrade and pg_dump via create trigger ... referencing. using a purpose-crafted trigger definition, an attacker can cause arbitrary sql statements to run, with superuser privileges.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: postgresql before versions 11.1, 10.6 is vulnerable to a to sql injection in pg_upgrade and pg_dump via create trigger ... referencing. using a purpose-crafted trigger definition, an attacker can cause arbitrary sql statements to run, with superuser privileges.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-11-13\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2008-6301", "mod_date": "2017-09-29", "pub_date": "2009-02-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in shoutbox_view.php in the small shoutbox module 1.4 for phpbb allows remote attackers to execute arbitrary sql commands via the id parameter in a delete action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in shoutbox_view.php in the small shoutbox module 1.4 for phpbb allows remote attackers to execute arbitrary sql commands via the id parameter in a delete action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-26\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-2865", "mod_date": "2017-09-29", "pub_date": "2008-06-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in kalptaru infotech php site lock 2.0 allows remote attackers to execute arbitrary sql commands via the articleid parameter in a show_article action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in kalptaru infotech php site lock 2.0 allows remote attackers to execute arbitrary sql commands via the articleid parameter in a show_article action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-25\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-6393", "mod_date": "2017-09-29", "pub_date": "2007-12-17", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in albums.php in ace image hosting script allows remote authenticated users to execute arbitrary sql commands via the id parameter in editalbum mode.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in albums.php in ace image hosting script allows remote authenticated users to execute arbitrary sql commands via the id parameter in editalbum mode.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-12-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-6678", "mod_date": "2017-08-17", "pub_date": "2009-04-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in asp/includes/contact.asp in quickersite 1.8.5 allows remote attackers to execute arbitrary sql commands via the snickname parameter in a profile action to default.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in asp/includes/contact.asp in quickersite 1.8.5 allows remote attackers to execute arbitrary sql commands via the snickname parameter in a profile action to default.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-08\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2019-0694", "mod_date": "2019-04-09", "pub_date": "2019-04-09", "cvss": 4.6, "cwe_code": 190, "cwe_name": " Integer Overflow or Wraparound", "summary": "an elevation of privilege vulnerability exists due to an integer overflow in windows subsystem for linux, aka 'windows subsystem for linux elevation of privilege vulnerability'. this cve id is unique from cve-2019-0682, cve-2019-0689, cve-2019-0692, cve-2019-0693.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Integer Overflow or Wraparound." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 190:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Integer Overflow or Wraparound\n- Summary: an elevation of privilege vulnerability exists due to an integer overflow in windows subsystem for linux, aka 'windows subsystem for linux elevation of privilege vulnerability'. this cve id is unique from cve-2019-0682, cve-2019-0689, cve-2019-0692, cve-2019-0693.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-04-09\n- Last Modified Date: 2019-04-09" } ] }, { "Unnamed: 0": "CVE-2017-0417", "mod_date": "2019-10-03", "pub_date": "2017-02-08", "cvss": 9.3, "cwe_code": 787, "cwe_name": " Out-of-bounds Write", "summary": "an elevation of privilege vulnerability in audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-32705438.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Out-of-bounds Write." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 787:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Out-of-bounds Write\n- Summary: an elevation of privilege vulnerability in audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-32705438.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-02-08\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-15974", "mod_date": "2018-12-17", "pub_date": "2018-10-17", "cvss": 6.8, "cwe_code": 426, "cwe_name": " Untrusted Search Path", "summary": "adobe framemaker versions 1.0.5.1 and below have an insecure library loading (dll hijacking) vulnerability. successful exploitation could lead to privilege escalation.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Untrusted Search Path." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 426:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Untrusted Search Path\n- Summary: adobe framemaker versions 1.0.5.1 and below have an insecure library loading (dll hijacking) vulnerability. successful exploitation could lead to privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-10-17\n- Last Modified Date: 2018-12-17" } ] }, { "Unnamed: 0": "CVE-2015-4109", "mod_date": "2018-10-09", "pub_date": "2015-06-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the ratings module in the users ultra plugin before 1.5.16 for wordpress allow remote attackers to execute arbitrary sql commands via the (1) data_target or (2) data_vote parameter in a rating_vote (wp_ajax_nopriv_rating_vote) action to wp-admin/admin-ajax.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the ratings module in the users ultra plugin before 1.5.16 for wordpress allow remote attackers to execute arbitrary sql commands via the (1) data_target or (2) data_vote parameter in a rating_vote (wp_ajax_nopriv_rating_vote) action to wp-admin/admin-ajax.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-06-09\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2017-1757", "mod_date": "2018-01-03", "pub_date": "2017-12-20", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "ibm security guardium 10.0 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 135858.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ibm security guardium 10.0 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 135858.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-20\n- Last Modified Date: 2018-01-03" } ] }, { "Unnamed: 0": "CVE-2019-1392", "mod_date": "2019-11-12", "pub_date": "2019-11-12", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists when the windows kernel fails to properly handle objects in memory, aka 'windows kernel elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists when the windows kernel fails to properly handle objects in memory, aka 'windows kernel elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-12\n- Last Modified Date: 2019-11-12" } ] }, { "Unnamed: 0": "CVE-2012-3468", "mod_date": "2012-08-13", "pub_date": "2012-08-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the ushahidi platform before 2.5 allow remote attackers to execute arbitrary sql commands via vectors related to (1) the verify function in application/controllers/alerts.php, (2) the save_all function in application/models/settings.php, or (3) the media type to the timeline function in application/controllers/json.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the ushahidi platform before 2.5 allow remote attackers to execute arbitrary sql commands via vectors related to (1) the verify function in application/controllers/alerts.php, (2) the save_all function in application/models/settings.php, or (3) the media type to the timeline function in application/controllers/json.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-08-12\n- Last Modified Date: 2012-08-13" } ] }, { "Unnamed: 0": "CVE-2008-4078", "mod_date": "2018-10-11", "pub_date": "2008-09-15", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the ar/ap transaction report in (1) ledgersmb (lsmb) before 1.2.15 and (2) sql-ledger 2.8.17 and earlier allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the ar/ap transaction report in (1) ledgersmb (lsmb) before 1.2.15 and (2) sql-ledger 2.8.17 and earlier allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-15\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2017-17614", "mod_date": "2017-12-26", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "food order script 1.0 has sql injection via the /list city parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: food order script 1.0 has sql injection via the /list city parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-26" } ] }, { "Unnamed: 0": "CVE-2018-1000225", "mod_date": "2018-10-19", "pub_date": "2018-08-20", "cvss": 4.3, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "cobbler version verified as present in cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a cross site scripting (xss) vulnerability in cobbler-web that can result in privilege escalation to admin.. this attack appear to be exploitable via \"network connectivity\". sending unauthenticated javascript payload to the cobbler xmlrpc api (/cobbler_api).", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.3\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: cobbler version verified as present in cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a cross site scripting (xss) vulnerability in cobbler-web that can result in privilege escalation to admin.. this attack appear to be exploitable via \"network connectivity\". sending unauthenticated javascript payload to the cobbler xmlrpc api (/cobbler_api).\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2018-08-20\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2018-20979", "mod_date": "2019-08-26", "pub_date": "2019-08-22", "cvss": 7.5, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the contact-form-7 plugin before 5.0.4 for wordpress has privilege escalation because of capability_type mishandling in register_post_type.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.5\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the contact-form-7 plugin before 5.0.4 for wordpress has privilege escalation because of capability_type mishandling in register_post_type.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-22\n- Last Modified Date: 2019-08-26" } ] }, { "Unnamed: 0": "CVE-2008-6950", "mod_date": "2017-09-29", "pub_date": "2009-08-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in login.asp in bankoi webhosting control panel 1.20 allow remote attackers to execute arbitrary sql commands via the (1) username or (2) password field.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in login.asp in bankoi webhosting control panel 1.20 allow remote attackers to execute arbitrary sql commands via the (1) username or (2) password field.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-08-12\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-1911", "mod_date": "2017-09-29", "pub_date": "2008-04-22", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in includes/system.php in 1024 cms 1.4.2 beta and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via a cookpass cookie.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in includes/system.php in 1024 cms 1.4.2 beta and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via a cookpass cookie.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-0461", "mod_date": "2017-09-29", "pub_date": "2008-01-25", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the search module in php-nuke 8.0 final and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the sid parameter in a comments action to modules.php. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the search module in php-nuke 8.0 final and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the sid parameter in a comments action to modules.php. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-25\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-15918", "mod_date": "2019-10-03", "pub_date": "2017-11-01", "cvss": 2.1, "cwe_code": 522, "cwe_name": " Insufficiently Protected Credentials", "summary": "sera 1.2 stores the user's login password in plain text in their home directory. this makes privilege escalation trivial and also exposes the user and system keychains to local attacks.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Insufficiently Protected Credentials." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 522:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 2.1\n- CWE Name: Insufficiently Protected Credentials\n- Summary: sera 1.2 stores the user's login password in plain text in their home directory. this makes privilege escalation trivial and also exposes the user and system keychains to local attacks.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-11-01\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-8254", "mod_date": "2018-08-06", "pub_date": "2018-06-14", "cvss": 3.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft project server, microsoft sharepoint. this cve id is unique from cve-2018-8252.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft project server, microsoft sharepoint. this cve id is unique from cve-2018-8252.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2018-06-14\n- Last Modified Date: 2018-08-06" } ] }, { "Unnamed: 0": "CVE-2016-0165", "mod_date": "2018-10-12", "pub_date": "2016-04-12", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel-mode driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0143 and cve-2016-0167.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel-mode driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0143 and cve-2016-0167.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-04-12\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2015-1769", "mod_date": "2019-05-14", "pub_date": "2015-08-15", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "mount manager in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted usb device, aka \"mount manager elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: mount manager in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted usb device, aka \"mount manager elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-08-15\n- Last Modified Date: 2019-05-14" } ] }, { "Unnamed: 0": "CVE-2017-17928", "mod_date": "2018-01-10", "pub_date": "2017-12-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "php scripts mall professional service script has sql injection via the admin/review.php id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: php scripts mall professional service script has sql injection via the admin/review.php id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-27\n- Last Modified Date: 2018-01-10" } ] }, { "Unnamed: 0": "CVE-2018-17136", "mod_date": "2018-11-01", "pub_date": "2018-09-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "zzcms 8.3 contains a sql injection vulnerability in /user/check.php via a client-ip http header.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: zzcms 8.3 contains a sql injection vulnerability in /user/check.php via a client-ip http header.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-09-17\n- Last Modified Date: 2018-11-01" } ] }, { "Unnamed: 0": "CVE-2008-6593", "mod_date": "2018-10-11", "pub_date": "2009-04-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in lightneasy/lightneasy.php in lightneasy sqlite 1.2.2 and earlier allows remote attackers to inject arbitrary php code into comments.dat via the dlid parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in lightneasy/lightneasy.php in lightneasy sqlite 1.2.2 and earlier allows remote attackers to inject arbitrary php code into comments.dat via the dlid parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-03\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2009-0427", "mod_date": "2017-10-19", "pub_date": "2009-02-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in categorymanager/upload_image_category.asp in dmxready member directory manager 1.1 and earlier allows remote attackers to execute arbitrary sql commands via the cid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in categorymanager/upload_image_category.asp in dmxready member directory manager 1.1 and earlier allows remote attackers to execute arbitrary sql commands via the cid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-05\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2017-11324", "mod_date": "2017-07-28", "pub_date": "2017-07-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in tilde cms 1.0.1. due to missing escaping of the backtick character, a select query in class.systemaction.php is vulnerable to sql injection. the vulnerability can be triggered via a post request to /actionphp/action.input.php with the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in tilde cms 1.0.1. due to missing escaping of the backtick character, a select query in class.systemaction.php is vulnerable to sql injection. the vulnerability can be triggered via a post request to /actionphp/action.input.php with the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-07-24\n- Last Modified Date: 2017-07-28" } ] }, { "Unnamed: 0": "CVE-2016-3376", "mod_date": "2018-10-12", "pub_date": "2016-10-14", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\" a different vulnerability than cve-2016-3266, cve-2016-7185, and cve-2016-7211.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\" a different vulnerability than cve-2016-3266, cve-2016-7185, and cve-2016-7211.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-10-14\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2009-0740", "mod_date": "2017-09-29", "pub_date": "2009-02-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in login.php in bluebird prelease allows remote attackers to execute arbitrary sql commands via the (1) username and (2) passwd parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in login.php in bluebird prelease allows remote attackers to execute arbitrary sql commands via the (1) username and (2) passwd parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-25\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-8120", "mod_date": "2019-10-03", "pub_date": "2018-05-09", "cvss": 7.2, "cwe_code": 404, "cwe_name": " Improper Resource Shutdown or Release", "summary": "an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability.\" this affects windows server 2008, windows 7, windows server 2008 r2. this cve id is unique from cve-2018-8124, cve-2018-8164, cve-2018-8166.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Resource Shutdown or Release." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 404:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Resource Shutdown or Release\n- Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability.\" this affects windows server 2008, windows 7, windows server 2008 r2. this cve id is unique from cve-2018-8124, cve-2018-8164, cve-2018-8166.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-05-09\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2017-7952", "mod_date": "2017-08-13", "pub_date": "2017-05-16", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "infor eam v11.0 build 201410 has sql injection via search fields, related to the filtervalue parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: infor eam v11.0 build 201410 has sql injection via search fields, related to the filtervalue parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-05-16\n- Last Modified Date: 2017-08-13" } ] }, { "Unnamed: 0": "CVE-2019-16692", "mod_date": "2019-10-01", "pub_date": "2019-09-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "phpipam 1.4 allows sql injection via the app/admin/custom-fields/filter-result.php table parameter when action=add is used.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: phpipam 1.4 allows sql injection via the app/admin/custom-fields/filter-result.php table parameter when action=add is used.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-22\n- Last Modified Date: 2019-10-01" } ] }, { "Unnamed: 0": "CVE-2018-8166", "mod_date": "2019-10-03", "pub_date": "2018-05-09", "cvss": 6.9, "cwe_code": 404, "cwe_name": " Improper Resource Shutdown or Release", "summary": "an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability.\" this affects windows 7, windows server 2012 r2, windows rt 8.1, windows server 2008, windows server 2012, windows 8.1, windows server 2016, windows server 2008 r2, windows 10, windows 10 servers. this cve id is unique from cve-2018-8120, cve-2018-8124, cve-2018-8164.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Resource Shutdown or Release." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 404:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Improper Resource Shutdown or Release\n- Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability.\" this affects windows 7, windows server 2012 r2, windows rt 8.1, windows server 2008, windows server 2012, windows 8.1, windows server 2016, windows server 2008 r2, windows 10, windows 10 servers. this cve id is unique from cve-2018-8120, cve-2018-8124, cve-2018-8164.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-05-09\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2015-2479", "mod_date": "2018-10-12", "pub_date": "2015-08-15", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the ryujit compiler in microsoft .net framework 4.6 produces incorrect code during an attempt at optimization, which allows remote attackers to execute arbitrary code via a crafted .net application, aka \"ryujit optimization elevation of privilege vulnerability,\" a different vulnerability than cve-2015-2480 and cve-2015-2481.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the ryujit compiler in microsoft .net framework 4.6 produces incorrect code during an attempt at optimization, which allows remote attackers to execute arbitrary code via a crafted .net application, aka \"ryujit optimization elevation of privilege vulnerability,\" a different vulnerability than cve-2015-2480 and cve-2015-2481.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-08-15\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2008-0360", "mod_date": "2017-10-19", "pub_date": "2008-01-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in blog:cms 4.2.1b allow remote attackers to execute arbitrary sql commands via (1) the blogid parameter to index.php, (2) the user parameter to action.php, or (3) the field parameter to admin/plugins/table/index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in blog:cms 4.2.1b allow remote attackers to execute arbitrary sql commands via (1) the blogid parameter to index.php, (2) the user parameter to action.php, or (3) the field parameter to admin/plugins/table/index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-18\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2008-6837", "mod_date": "2017-08-17", "pub_date": "2009-06-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in zoph 0.7.2.1 allows remote attackers to execute arbitrary sql commands via unspecified vectors, a different issue than cve-2008-3258. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in zoph 0.7.2.1 allows remote attackers to execute arbitrary sql commands via unspecified vectors, a different issue than cve-2008-3258. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-06-27\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2019-1007", "mod_date": "2019-06-13", "pub_date": "2019-06-12", "cvss": 4.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1021, cve-2019-1022, cve-2019-1026, cve-2019-1027, cve-2019-1028.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1021, cve-2019-1022, cve-2019-1026, cve-2019-1027, cve-2019-1028.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-06-12\n- Last Modified Date: 2019-06-13" } ] }, { "Unnamed: 0": "CVE-2017-5736", "mod_date": "2019-10-03", "pub_date": "2018-03-20", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege in intel software guard extensions platform software component before 1.9.105.42329 allows a local attacker to execute arbitrary code as administrator.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege in intel software guard extensions platform software component before 1.9.105.42329 allows a local attacker to execute arbitrary code as administrator.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-03-20\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2010-1463", "mod_date": "2018-10-10", "pub_date": "2010-04-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in webasyst shop-script free allow attackers to execute arbitrary sql commands via the (1) add2cart, (2) c_id, (3) categoryid, (4) list_price, (5) name, (6) new_offer, (7) price, (8) product_code, (9) productid, (10) rating, and (11) save_product parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in webasyst shop-script free allow attackers to execute arbitrary sql commands via the (1) add2cart, (2) c_id, (3) categoryid, (4) list_price, (5) name, (6) new_offer, (7) price, (8) product_code, (9) productid, (10) rating, and (11) save_product parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-16\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2017-2716", "mod_date": "2017-12-11", "pub_date": "2017-11-22", "cvss": 9.3, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "the camerafs driver in mate 9 versions earlier than mha-al00bc00b173 has buffer overflow vulnerability. an attacker tricks a user into installing a malicious application which has the system privilege of the android system and sends a specific parameter to the driver of the smart phone, causing a system crash or privilege escalation.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: the camerafs driver in mate 9 versions earlier than mha-al00bc00b173 has buffer overflow vulnerability. an attacker tricks a user into installing a malicious application which has the system privilege of the android system and sends a specific parameter to the driver of the smart phone, causing a system crash or privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-11-22\n- Last Modified Date: 2017-12-11" } ] }, { "Unnamed: 0": "CVE-2018-15762", "mod_date": "2019-10-09", "pub_date": "2018-11-02", "cvss": 6.5, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "pivotal operations manager, versions 2.0.x prior to 2.0.24, versions 2.1.x prior to 2.1.15, versions 2.2.x prior to 2.2.7, and versions 2.3.x prior to 2.3.1, grants all users a scope which allows for privilege escalation. a remote malicious user who has been authenticated may create a new client with administrator privileges for opsman.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Privilege Management\n- Summary: pivotal operations manager, versions 2.0.x prior to 2.0.24, versions 2.1.x prior to 2.1.15, versions 2.2.x prior to 2.2.7, and versions 2.3.x prior to 2.3.1, grants all users a scope which allows for privilege escalation. a remote malicious user who has been authenticated may create a new client with administrator privileges for opsman.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-11-02\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2019-8429", "mod_date": "2019-02-19", "pub_date": "2019-02-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "zoneminder before 1.32.3 has sql injection via the ajax/status.php filter[query][terms][0][cnj] parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: zoneminder before 1.32.3 has sql injection via the ajax/status.php filter[query][terms][0][cnj] parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-02-18\n- Last Modified Date: 2019-02-19" } ] }, { "Unnamed: 0": "CVE-2017-4992", "mod_date": "2019-10-03", "pub_date": "2017-06-13", "cvss": 7.5, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an issue was discovered in cloud foundry foundation cf-release versions prior to v261; uaa release 2.x versions prior to v2.7.4.17, 3.6.x versions prior to v3.6.11, 3.9.x versions prior to v3.9.13, and other versions prior to v4.2.0; and uaa bosh release (uaa-release) 13.x versions prior to v13.15, 24.x versions prior to v24.10, 30.x versions prior to 30.3, and other versions prior to v37. there is privilege escalation (arbitrary password reset) with user invitations.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.5\n- CWE Name: Improper Privilege Management\n- Summary: an issue was discovered in cloud foundry foundation cf-release versions prior to v261; uaa release 2.x versions prior to v2.7.4.17, 3.6.x versions prior to v3.6.11, 3.9.x versions prior to v3.9.13, and other versions prior to v4.2.0; and uaa bosh release (uaa-release) 13.x versions prior to v13.15, 24.x versions prior to v24.10, 30.x versions prior to 30.3, and other versions prior to v37. there is privilege escalation (arbitrary password reset) with user invitations.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-06-13\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2019-5512", "mod_date": "2019-04-11", "pub_date": "2019-04-09", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "vmware workstation (15.x before 15.0.3, 14.x before 14.1.6) running on windows does not handle com classes appropriately. successful exploitation of this issue may allow hijacking of com classes used by the vmx process, on a windows host, leading to elevation of privilege.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: vmware workstation (15.x before 15.0.3, 14.x before 14.1.6) running on windows does not handle com classes appropriately. successful exploitation of this issue may allow hijacking of com classes used by the vmx process, on a windows host, leading to elevation of privilege.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-04-09\n- Last Modified Date: 2019-04-11" } ] }, { "Unnamed: 0": "CVE-2018-16389", "mod_date": "2018-11-02", "pub_date": "2018-09-12", "cvss": 5.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "e107_admin/banlist.php in e107 2.1.8 allows sql injection via the old_ip parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: e107_admin/banlist.php in e107 2.1.8 allows sql injection via the old_ip parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/NONE\n- Published Date: 2018-09-12\n- Last Modified Date: 2018-11-02" } ] }, { "Unnamed: 0": "CVE-2009-0531", "mod_date": "2017-09-29", "pub_date": "2009-02-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in gallery/view.asp in a better member-based asp photo gallery before 1.2 allows remote attackers to execute arbitrary sql commands via the entry parameter. version 1.2 released which fixed the sql injection bug. it also properly deletes thumbnails for invalid filetypes (invalid files were removed but the thumbnails remained).\r\n\r\nhttp://www.ontarioabandonedplaces.com/ipguardian/", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in gallery/view.asp in a better member-based asp photo gallery before 1.2 allows remote attackers to execute arbitrary sql commands via the entry parameter. version 1.2 released which fixed the sql injection bug. it also properly deletes thumbnails for invalid filetypes (invalid files were removed but the thumbnails remained).\r\n\r\nhttp://www.ontarioabandonedplaces.com/ipguardian/\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-11\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-3302", "mod_date": "2019-05-16", "pub_date": "2016-09-14", "cvss": 6.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft windows 8.1, windows server 2012 r2, windows rt 8.1, and windows 10 gold, 1511, and 1607, when the lock screen is enabled, do not properly restrict the loading of web content, which allows physically proximate attackers to execute arbitrary code via a (1) crafted wi-fi access point or (2) crafted mobile-broadband device, aka \"windows lock screen elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft windows 8.1, windows server 2012 r2, windows rt 8.1, and windows 10 gold, 1511, and 1607, when the lock screen is enabled, do not properly restrict the loading of web content, which allows physically proximate attackers to execute arbitrary code via a (1) crafted wi-fi access point or (2) crafted mobile-broadband device, aka \"windows lock screen elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-09-14\n- Last Modified Date: 2019-05-16" } ] }, { "Unnamed: 0": "CVE-2015-2147", "mod_date": "2017-10-11", "pub_date": "2017-10-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in issuetracker phpbugtracker before 1.7.0 allow remote attackers to execute arbitrary sql commands via unspecified parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in issuetracker phpbugtracker before 1.7.0 allow remote attackers to execute arbitrary sql commands via unspecified parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-06\n- Last Modified Date: 2017-10-11" } ] }, { "Unnamed: 0": "CVE-2014-100011", "mod_date": "2018-10-09", "pub_date": "2015-01-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in /send-to in sendy 1.1.9.1 allows remote attackers to execute arbitrary sql commands via the c parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in /send-to in sendy 1.1.9.1 allows remote attackers to execute arbitrary sql commands via the c parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-13\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2019-12599", "mod_date": "2019-06-10", "pub_date": "2019-06-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "suitecrm 7.10.x before 7.10.17 and 7.11.x before 7.11.5 allows sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: suitecrm 7.10.x before 7.10.17 and 7.11.x before 7.11.5 allows sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-06-07\n- Last Modified Date: 2019-06-10" } ] }, { "Unnamed: 0": "CVE-2007-0582", "mod_date": "2017-10-19", "pub_date": "2007-01-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in default.asp in chernobile 1.0 allows remote attackers to execute arbitrary sql commands via the user (username) field.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in default.asp in chernobile 1.0 allows remote attackers to execute arbitrary sql commands via the user (username) field.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-01-30\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2010-1859", "mod_date": "2010-05-10", "pub_date": "2010-05-07", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in newpost.php in deluxebb 1.3 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the membercookie cookie when adding a new thread.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in newpost.php in deluxebb 1.3 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the membercookie cookie when adding a new thread.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-07\n- Last Modified Date: 2010-05-10" } ] }, { "Unnamed: 0": "CVE-2015-9324", "mod_date": "2019-08-26", "pub_date": "2019-08-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the easy-digital-downloads plugin before 2.3.3 for wordpress has sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the easy-digital-downloads plugin before 2.3.3 for wordpress has sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-16\n- Last Modified Date: 2019-08-26" } ] }, { "Unnamed: 0": "CVE-2007-5233", "mod_date": "2017-09-29", "pub_date": "2007-10-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in web template management system 1.3 allows remote attackers to execute arbitrary sql commands via the id parameter in a readmore action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in web template management system 1.3 allows remote attackers to execute arbitrary sql commands via the id parameter in a readmore action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-10-05\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-1662", "mod_date": "2017-09-29", "pub_date": "2009-05-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in admin/login.php in wright way services recipe script 5 allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields, as reachable from admin/index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in admin/login.php in wright way services recipe script 5 allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields, as reachable from admin/index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-18\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-0440", "mod_date": "2019-10-03", "pub_date": "2017-02-08", "cvss": 7.6, "cwe_code": 120, "cwe_name": " Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", "summary": "an elevation of privilege vulnerability in the qualcomm wi-fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-33252788. references: qc-cr#1095770.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 120:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')\n- Summary: an elevation of privilege vulnerability in the qualcomm wi-fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-33252788. references: qc-cr#1095770.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-02-08\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2019-0973", "mod_date": "2019-06-13", "pub_date": "2019-06-12", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists in the windows installer when the windows installer fails to properly sanitize input leading to an insecure library loading behavior.a locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'windows installer elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists in the windows installer when the windows installer fails to properly sanitize input leading to an insecure library loading behavior.a locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'windows installer elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-06-12\n- Last Modified Date: 2019-06-13" } ] }, { "Unnamed: 0": "CVE-2017-0358", "mod_date": "2019-10-03", "pub_date": "2018-04-13", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "jann horn of google project zero discovered that ntfs-3g, a read-write ntfs driver for fuse, does not scrub the environment before executing modprobe with elevated privileges. a local user can take advantage of this flaw for local root privilege escalation.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: jann horn of google project zero discovered that ntfs-3g, a read-write ntfs driver for fuse, does not scrub the environment before executing modprobe with elevated privileges. a local user can take advantage of this flaw for local root privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-04-13\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2009-3494", "mod_date": "2018-10-10", "pub_date": "2009-09-30", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in index.php in t-htb manager 0.5, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via (1) the id parameter in a delete_category action, (2) the name parameter in an update_category action, and other vectors.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in index.php in t-htb manager 0.5, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via (1) the id parameter in a delete_category action, (2) the name parameter in an update_category action, and other vectors.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-30\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2010-2616", "mod_date": "2017-08-17", "pub_date": "2010-07-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in bible.php in php bible search, probably 0.99, allows remote attackers to execute arbitrary sql commands via the chapter parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in bible.php in php bible search, probably 0.99, allows remote attackers to execute arbitrary sql commands via the chapter parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-02\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2008-5766", "mod_date": "2017-09-29", "pub_date": "2008-12-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in download.php in farsi script faupload allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in download.php in farsi script faupload allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-30\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-11200", "mod_date": "2017-07-16", "pub_date": "2017-07-13", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in finecms through 2017-07-12 via the application/core/controller/excludes.php visitor_ip parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in finecms through 2017-07-12 via the application/core/controller/excludes.php visitor_ip parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-07-13\n- Last Modified Date: 2017-07-16" } ] }, { "Unnamed: 0": "CVE-2017-16543", "mod_date": "2018-08-07", "pub_date": "2017-11-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "zoho manageengine applications manager 13 before build 13500 allows sql injection via graphicalview.do, as demonstrated by a crafted viewprops ycanvas field or viewid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: zoho manageengine applications manager 13 before build 13500 allows sql injection via graphicalview.do, as demonstrated by a crafted viewprops ycanvas field or viewid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-11-05\n- Last Modified Date: 2018-08-07" } ] }, { "Unnamed: 0": "CVE-2016-7405", "mod_date": "2017-07-01", "pub_date": "2016-10-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the qstr method in the pdo driver in the adodb library for php before 5.x before 5.20.7 might allow remote attackers to conduct sql injection attacks via vectors related to incorrect quoting.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the qstr method in the pdo driver in the adodb library for php before 5.x before 5.20.7 might allow remote attackers to conduct sql injection attacks via vectors related to incorrect quoting.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-10-03\n- Last Modified Date: 2017-07-01" } ] }, { "Unnamed: 0": "CVE-2017-14960", "mod_date": "2018-01-17", "pub_date": "2018-01-04", "cvss": 5.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "xdashboard in opentext document sciences xpression (formerly emc document sciences xpression) v4.5sp1 patch 13 has sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: xdashboard in opentext document sciences xpression (formerly emc document sciences xpression) v4.5sp1 patch 13 has sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2018-01-04\n- Last Modified Date: 2018-01-17" } ] }, { "Unnamed: 0": "CVE-2010-4935", "mod_date": "2012-05-14", "pub_date": "2011-10-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in poll.php in entrans 0.3.2 and earlier allows remote attackers to execute arbitrary sql commands via the sid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in poll.php in entrans 0.3.2 and earlier allows remote attackers to execute arbitrary sql commands via the sid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-10-09\n- Last Modified Date: 2012-05-14" } ] }, { "Unnamed: 0": "CVE-2019-4536", "mod_date": "2019-10-09", "pub_date": "2019-08-29", "cvss": 3.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "ibm i 7.4 users who have done a restore user profile (rstusrprf) on a system which has been configured with db2 mirror for i might have user profiles with elevated privileges caused by incorrect processing during a restore of multiple user profiles. a user with restore privileges could exploit this vulnerability to obtain elevated privileges on the restored system. ibm x-force id: 165592.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: ibm i 7.4 users who have done a restore user profile (rstusrprf) on a system which has been configured with db2 mirror for i might have user profiles with elevated privileges caused by incorrect processing during a restore of multiple user profiles. a user with restore privileges could exploit this vulnerability to obtain elevated privileges on the restored system. ibm x-force id: 165592.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/NONE\n- Published Date: 2019-08-29\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2018-6411", "mod_date": "2018-06-29", "pub_date": "2018-05-26", "cvss": 7.5, "cwe_code": 434, "cwe_name": " Unrestricted Upload of File with Dangerous Type", "summary": "an issue was discovered in appnitro machform before 4.2.3. when the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. if the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Unrestricted Upload of File with Dangerous Type." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 434:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Unrestricted Upload of File with Dangerous Type\n- Summary: an issue was discovered in appnitro machform before 4.2.3. when the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. if the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-26\n- Last Modified Date: 2018-06-29" } ] }, { "Unnamed: 0": "CVE-2018-15918", "mod_date": "2018-11-05", "pub_date": "2018-09-05", "cvss": 5.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in jorani 0.6.5. sql injection (error-based) allows a user of the application without permissions to read and modify sensitive information from the database used by the application via the startdate or enddate parameter to leaves/validate.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in jorani 0.6.5. sql injection (error-based) allows a user of the application without permissions to read and modify sensitive information from the database used by the application via the startdate or enddate parameter to leaves/validate.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/NONE\n- Published Date: 2018-09-05\n- Last Modified Date: 2018-11-05" } ] }, { "Unnamed: 0": "CVE-2015-7568", "mod_date": "2019-03-12", "pub_date": "2017-04-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the password recovery feature in yeager cms 1.2.1 allows remote attackers to change the account credentials of known users via the \"useremail\" parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the password recovery feature in yeager cms 1.2.1 allows remote attackers to change the account credentials of known users via the \"useremail\" parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-04-24\n- Last Modified Date: 2019-03-12" } ] }, { "Unnamed: 0": "CVE-2014-8306", "mod_date": "2014-12-16", "pub_date": "2014-10-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the sql_query function in cart.php in c97net cart engine before 4.0 allows remote attackers to execute arbitrary sql commands via the item_id variable, as demonstrated by the (1) item_id[0] or (2) item_id[] parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the sql_query function in cart.php in c97net cart engine before 4.0 allows remote attackers to execute arbitrary sql commands via the item_id variable, as demonstrated by the (1) item_id[0] or (2) item_id[] parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-10-16\n- Last Modified Date: 2014-12-16" } ] }, { "Unnamed: 0": "CVE-2008-4375", "mod_date": "2017-09-29", "pub_date": "2008-10-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in viewprofile.php in availscript classmate script allows remote attackers to execute arbitrary sql commands via the p parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in viewprofile.php in availscript classmate script allows remote attackers to execute arbitrary sql commands via the p parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-01\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-13220", "mod_date": "2019-10-03", "pub_date": "2018-01-12", "cvss": 4.6, "cwe_code": 843, "cwe_name": " Access of Resource Using Incompatible Type ('Type Confusion')", "summary": "an elevation of privilege vulnerability in the upstream kernel bluez. product: android. versions: android kernel. android id: a-63527053.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Access of Resource Using Incompatible Type ('Type Confusion')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 843:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Access of Resource Using Incompatible Type ('Type Confusion')\n- Summary: an elevation of privilege vulnerability in the upstream kernel bluez. product: android. versions: android kernel. android id: a-63527053.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-12\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-19893", "mod_date": "2018-12-26", "pub_date": "2018-12-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "searchcontroller.php in pbootcms 1.2.1 has sql injection via the index.php/search/index.html query string.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: searchcontroller.php in pbootcms 1.2.1 has sql injection via the index.php/search/index.html query string.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-12-06\n- Last Modified Date: 2018-12-26" } ] }, { "Unnamed: 0": "CVE-2018-18787", "mod_date": "2018-12-04", "pub_date": "2018-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in zzcms 8.3. sql injection exists in zs/zs.php via a pxzs cookie.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in zzcms 8.3. sql injection exists in zs/zs.php via a pxzs cookie.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-10-29\n- Last Modified Date: 2018-12-04" } ] }, { "Unnamed: 0": "CVE-2018-5994", "mod_date": "2018-03-05", "pub_date": "2018-02-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the js jobs 1.1.9 component for joomla! via the zipcode parameter in a newest-jobs request, or the ta parameter in a view_resume request.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the js jobs 1.1.9 component for joomla! via the zipcode parameter in a newest-jobs request, or the ta parameter in a view_resume request.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-17\n- Last Modified Date: 2018-03-05" } ] }, { "Unnamed: 0": "CVE-2006-6706", "mod_date": "2011-03-08", "pub_date": "2006-12-23", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in soumu workflow for groupmax 01-00 through 01-01, soumu workflow 02-00 through 03-03, and koukyoumuke soumu workflow 01-00 through 01-01 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors in certain web pages.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in soumu workflow for groupmax 01-00 through 01-01, soumu workflow 02-00 through 03-03, and koukyoumuke soumu workflow 01-00 through 01-01 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors in certain web pages.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-12-23\n- Last Modified Date: 2011-03-08" } ] }, { "Unnamed: 0": "CVE-2019-9184", "mod_date": "2019-04-25", "pub_date": "2019-02-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the j2store plugin 3.x before 3.3.7 for joomla! allows remote attackers to execute arbitrary sql commands via the product_option[] parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the j2store plugin 3.x before 3.3.7 for joomla! allows remote attackers to execute arbitrary sql commands via the product_option[] parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-02-26\n- Last Modified Date: 2019-04-25" } ] }, { "Unnamed: 0": "CVE-2015-1364", "mod_date": "2015-01-28", "pub_date": "2015-01-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the getprofile function in system/profile.functions.php in free reprintables articlefr 3.0.5 allows remote attackers to execute arbitrary sql commands via the username parameter to register/.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the getprofile function in system/profile.functions.php in free reprintables articlefr 3.0.5 allows remote attackers to execute arbitrary sql commands via the username parameter to register/.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-27\n- Last Modified Date: 2015-01-28" } ] }, { "Unnamed: 0": "CVE-2009-4708", "mod_date": "2010-03-16", "pub_date": "2010-03-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the [gobernalia] front end news submitter (gb_fenewssubmit) extension 0.1.0 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the [gobernalia] front end news submitter (gb_fenewssubmit) extension 0.1.0 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-15\n- Last Modified Date: 2010-03-16" } ] }, { "Unnamed: 0": "CVE-2010-0337", "mod_date": "2011-04-29", "pub_date": "2010-01-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the tt_news mail alert (dl3_tt_news_alerts) extension 0.2.0 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the tt_news mail alert (dl3_tt_news_alerts) extension 0.2.0 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-15\n- Last Modified Date: 2011-04-29" } ] }, { "Unnamed: 0": "CVE-2019-7962", "mod_date": "2019-11-14", "pub_date": "2019-11-14", "cvss": 4.4, "cwe_code": 426, "cwe_name": " Untrusted Search Path", "summary": "adobe illustrator cc versions 23.1 and earlier have an insecure library loading (dll hijacking) vulnerability. successful exploitation could lead to privilege escalation.", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Untrusted Search Path." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 426:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.4\n- CWE Name: Untrusted Search Path\n- Summary: adobe illustrator cc versions 23.1 and earlier have an insecure library loading (dll hijacking) vulnerability. successful exploitation could lead to privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-14\n- Last Modified Date: 2019-11-14" } ] }, { "Unnamed: 0": "CVE-2009-4721", "mod_date": "2017-09-19", "pub_date": "2010-03-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in admin/index.asp in andrews-web (a-w) bannerad 1.0 allow remote attackers to execute arbitrary sql commands via the (1) user and (2) password parameters. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in admin/index.asp in andrews-web (a-w) bannerad 1.0 allow remote attackers to execute arbitrary sql commands via the (1) user and (2) password parameters. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-18\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2019-5488", "mod_date": "2019-02-14", "pub_date": "2019-01-07", "cvss": 5.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "earclink espcms-p8 has sql injection in the install_pack/index.php?ac=member&at=verifyaccount verify_key parameter. install_pack/espcms_public/espcms_db.php may allow retrieving sensitive information from the espcms database.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: earclink espcms-p8 has sql injection in the install_pack/index.php?ac=member&at=verifyaccount verify_key parameter. install_pack/espcms_public/espcms_db.php may allow retrieving sensitive information from the espcms database.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2019-01-07\n- Last Modified Date: 2019-02-14" } ] }, { "Unnamed: 0": "CVE-2008-2456", "mod_date": "2017-09-29", "pub_date": "2008-05-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in comicshout 2.5 and earlier allows remote attackers to execute arbitrary sql commands via the comic_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in comicshout 2.5 and earlier allows remote attackers to execute arbitrary sql commands via the comic_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-27\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2012-6584", "mod_date": "2013-08-27", "pub_date": "2013-08-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in myre realty manager allow remote attackers to execute arbitrary sql commands via the bathrooms1 parameter to (1) demo2/search.php or (2) search.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in myre realty manager allow remote attackers to execute arbitrary sql commands via the bathrooms1 parameter to (1) demo2/search.php or (2) search.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-08-25\n- Last Modified Date: 2013-08-27" } ] }, { "Unnamed: 0": "CVE-2016-6789", "mod_date": "2017-10-19", "pub_date": "2017-01-12", "cvss": 9.3, "cwe_code": 284, "cwe_name": " Improper Access Control", "summary": "an elevation of privilege vulnerability in the nvidia libomx library (libnvomx) could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: kernel-3.18. android id: a-31251973. references: n-cve-2016-6789.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Access Control." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 284:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Access Control\n- Summary: an elevation of privilege vulnerability in the nvidia libomx library (libnvomx) could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: kernel-3.18. android id: a-31251973. references: n-cve-2016-6789.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-01-12\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2010-2694", "mod_date": "2010-07-13", "pub_date": "2010-07-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the redshop component (com_redshop) 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the pid parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the redshop component (com_redshop) 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the pid parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-12\n- Last Modified Date: 2010-07-13" } ] }, { "Unnamed: 0": "CVE-2011-5235", "mod_date": "2017-08-29", "pub_date": "2012-10-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in mnogosearch before 3.3.12 allows remote attackers to execute arbitrary sql commands via the hostname in a hypertext link.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in mnogosearch before 3.3.12 allows remote attackers to execute arbitrary sql commands via the hostname in a hypertext link.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-10-25\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2014-8588", "mod_date": "2018-12-10", "pub_date": "2014-11-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in metadata.xsjs in sap hana 1.00.60.379371 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in metadata.xsjs in sap hana 1.00.60.379371 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-11-04\n- Last Modified Date: 2018-12-10" } ] }, { "Unnamed: 0": "CVE-2009-4971", "mod_date": "2010-07-28", "pub_date": "2010-07-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the ajax chat (vjchat) extension before 0.3.3 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the ajax chat (vjchat) extension before 0.3.3 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-28\n- Last Modified Date: 2010-07-28" } ] }, { "Unnamed: 0": "CVE-2010-0954", "mod_date": "2017-08-17", "pub_date": "2010-03-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in search_result.asp in pre projects pre e-learning portal allows remote attackers to execute arbitrary sql commands via the course_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in search_result.asp in pre projects pre e-learning portal allows remote attackers to execute arbitrary sql commands via the course_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-10\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2010-4400", "mod_date": "2010-12-20", "pub_date": "2010-12-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in _rights.php in dynpg cms 4.2.0 allows remote attackers to execute arbitrary sql commands via the giverights_userid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in _rights.php in dynpg cms 4.2.0 allows remote attackers to execute arbitrary sql commands via the giverights_userid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-12-06\n- Last Modified Date: 2010-12-20" } ] }, { "Unnamed: 0": "CVE-2008-3267", "mod_date": "2017-09-29", "pub_date": "2008-07-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in mojojobs.cgi in mojojobs allows remote attackers to execute arbitrary sql commands via the cat_a parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in mojojobs.cgi in mojojobs allows remote attackers to execute arbitrary sql commands via the cat_a parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-4432", "mod_date": "2009-12-29", "pub_date": "2009-12-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in codemight videocms 3.1 allows remote attackers to execute arbitrary sql commands via the v parameter in a video action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in codemight videocms 3.1 allows remote attackers to execute arbitrary sql commands via the v parameter in a video action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-12-28\n- Last Modified Date: 2009-12-29" } ] }, { "Unnamed: 0": "CVE-2008-4705", "mod_date": "2017-09-29", "pub_date": "2008-10-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in success_story.php in php online dating software myphpdating allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in success_story.php in php online dating software myphpdating allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-23\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-17617", "mod_date": "2017-12-26", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "foodspotting clone script 1.0 has sql injection via the quicksearch.php q parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: foodspotting clone script 1.0 has sql injection via the quicksearch.php q parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-26" } ] }, { "Unnamed: 0": "CVE-2018-17232", "mod_date": "2019-09-26", "pub_date": "2018-09-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in archivebot.py in docmarionum1 slack archivebot (aka slack-archive-bot) before 2018-09-19 allows remote attackers to execute arbitrary sql commands via the text parameter to cursor.execute().", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in archivebot.py in docmarionum1 slack archivebot (aka slack-archive-bot) before 2018-09-19 allows remote attackers to execute arbitrary sql commands via the text parameter to cursor.execute().\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-09-20\n- Last Modified Date: 2019-09-26" } ] }, { "Unnamed: 0": "CVE-2015-1400", "mod_date": "2015-02-04", "pub_date": "2015-02-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in search.php in npds revolution 13 allows remote attackers to execute arbitrary sql commands via the query parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in search.php in npds revolution 13 allows remote attackers to execute arbitrary sql commands via the query parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-02-03\n- Last Modified Date: 2015-02-04" } ] }, { "Unnamed: 0": "CVE-2009-1500", "mod_date": "2018-10-10", "pub_date": "2009-05-01", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in projectcms 1.0 beta allows remote attackers to execute arbitrary sql commands via the sn parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in projectcms 1.0 beta allows remote attackers to execute arbitrary sql commands via the sn parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-01\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2018-10256", "mod_date": "2018-06-13", "pub_date": "2018-05-01", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability was discovered in hrsale the ultimate hrm v1.0.2 that allows a user with low level privileges to directly modify the sql query.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability was discovered in hrsale the ultimate hrm v1.0.2 that allows a user with low level privileges to directly modify the sql query.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-01\n- Last Modified Date: 2018-06-13" } ] }, { "Unnamed: 0": "CVE-2010-0974", "mod_date": "2017-08-17", "pub_date": "2010-03-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in phpcityportal allow remote attackers to execute arbitrary sql commands via the id parameter to (1) video_show.php, (2) spotlight_detail.php, (3) real_estate_details.php, and (4) auto_details.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in phpcityportal allow remote attackers to execute arbitrary sql commands via the id parameter to (1) video_show.php, (2) spotlight_detail.php, (3) real_estate_details.php, and (4) auto_details.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-16\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2019-14231", "mod_date": "2019-07-23", "pub_date": "2019-07-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in the viral quiz maker - onionbuzz plugin before 1.2.2 for wordpress. one could exploit the points parameter in the ob_get_results ajax nopriv handler due to there being no sanitization prior to use in a sql query in getresultbypointstrivia. this allows an unauthenticated/unprivileged user to perform a sql injection attack capable of remote code execution and information disclosure.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in the viral quiz maker - onionbuzz plugin before 1.2.2 for wordpress. one could exploit the points parameter in the ob_get_results ajax nopriv handler due to there being no sanitization prior to use in a sql query in getresultbypointstrivia. this allows an unauthenticated/unprivileged user to perform a sql injection attack capable of remote code execution and information disclosure.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-07-21\n- Last Modified Date: 2019-07-23" } ] }, { "Unnamed: 0": "CVE-2019-15239", "mod_date": "2019-09-24", "pub_date": "2019-08-20", "cvss": 7.2, "cwe_code": 416, "cwe_name": " Use After Free", "summary": "in the linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. this can result in a kernel crash, or potentially in privilege escalation. note: this affects (for example) linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Use After Free." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 416:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Use After Free\n- Summary: in the linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. this can result in a kernel crash, or potentially in privilege escalation. note: this affects (for example) linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-08-20\n- Last Modified Date: 2019-09-24" } ] }, { "Unnamed: 0": "CVE-2017-17957", "mod_date": "2018-04-13", "pub_date": "2017-12-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "php scripts mall php multivendor ecommerce has sql injection via the my_wishlist.php fid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: php scripts mall php multivendor ecommerce has sql injection via the my_wishlist.php fid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-28\n- Last Modified Date: 2018-04-13" } ] }, { "Unnamed: 0": "CVE-2010-1006", "mod_date": "2010-03-22", "pub_date": "2010-03-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the brainstorming extension 0.1.8 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the brainstorming extension 0.1.8 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-19\n- Last Modified Date: 2010-03-22" } ] }, { "Unnamed: 0": "CVE-2009-3667", "mod_date": "2017-09-19", "pub_date": "2009-10-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/index.php in adsdx 3.05 allows remote attackers to execute arbitrary sql commands via the username.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/index.php in adsdx 3.05 allows remote attackers to execute arbitrary sql commands via the username.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-10-11\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2017-7293", "mod_date": "2019-10-03", "pub_date": "2017-04-26", "cvss": 7.2, "cwe_code": 502, "cwe_name": " Deserialization of Untrusted Data", "summary": "the dolby dax2 and dax3 api services are vulnerable to a privilege escalation vulnerability that allows a normal user to get arbitrary system privileges, because these services have .net code for dcom. this affects dolby audio x2 (dax2) 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3, and 1.4.4 and dolby audio x3 (dax3) 1.0 and 1.1. an example affected driver is realtek audio driver 6.0.1.7898 on a lenovo p50.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Deserialization of Untrusted Data." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 502:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Deserialization of Untrusted Data\n- Summary: the dolby dax2 and dax3 api services are vulnerable to a privilege escalation vulnerability that allows a normal user to get arbitrary system privileges, because these services have .net code for dcom. this affects dolby audio x2 (dax2) 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3, and 1.4.4 and dolby audio x3 (dax3) 1.0 and 1.1. an example affected driver is realtek audio driver 6.0.1.7898 on a lenovo p50.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-04-26\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2008-5774", "mod_date": "2017-09-29", "pub_date": "2008-12-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in aspsiteware homebuilder 1.0 and 2.0 allow remote attackers to execute arbitrary sql commands via the (1) itype parameter to (a) type.asp and (b) type2.asp and the (2) ipro parameter to (c) detail.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in aspsiteware homebuilder 1.0 and 2.0 allow remote attackers to execute arbitrary sql commands via the (1) itype parameter to (a) type.asp and (b) type2.asp and the (2) ipro parameter to (c) detail.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-30\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-8563", "mod_date": "2019-10-03", "pub_date": "2017-07-11", "cvss": 5.1, "cwe_code": 281, "cwe_name": " Improper Preservation of Permissions", "summary": "microsoft windows 7 sp1, windows server 2008 sp2 and r2 sp1, windows 8.1 and windows rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability due to kerberos falling back to nt lan manager (ntlm) authentication protocol as the default authentication protocol, aka \"windows elevation of privilege vulnerability\".", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Preservation of Permissions." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 281:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 5.1\n- CWE Name: Improper Preservation of Permissions\n- Summary: microsoft windows 7 sp1, windows server 2008 sp2 and r2 sp1, windows 8.1 and windows rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability due to kerberos falling back to nt lan manager (ntlm) authentication protocol as the default authentication protocol, aka \"windows elevation of privilege vulnerability\".\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-07-11\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2005-4711", "mod_date": "2017-07-20", "pub_date": "2005-12-31", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in neocrome land down under (ldu) 801 allows remote attackers to execute arbitrary sql commands via an http referer header. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in neocrome land down under (ldu) 801 allows remote attackers to execute arbitrary sql commands via an http referer header. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-12-31\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2008-6781", "mod_date": "2017-09-29", "pub_date": "2009-05-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in directory.php in sites for scripts (sfs) gaming directory allows remote attackers to execute arbitrary sql commands via the cat_id parameter in a list action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in directory.php in sites for scripts (sfs) gaming directory allows remote attackers to execute arbitrary sql commands via the cat_id parameter in a list action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-01\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-2792", "mod_date": "2017-09-29", "pub_date": "2008-06-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in erocms 1.4 and earlier allows remote attackers to execute arbitrary sql commands via the site parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in erocms 1.4 and earlier allows remote attackers to execute arbitrary sql commands via the site parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-20\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-5955", "mod_date": "2017-09-29", "pub_date": "2009-01-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in show.php in wbstreet (aka phpstreet webboard) 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in show.php in wbstreet (aka phpstreet webboard) 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-23\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-1641", "mod_date": "2018-10-11", "pub_date": "2008-04-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in default.asp in efestech video 5.0 allows remote attackers to execute arbitrary sql commands via the catid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in default.asp in efestech video 5.0 allows remote attackers to execute arbitrary sql commands via the catid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-02\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2017-14847", "mod_date": "2017-10-05", "pub_date": "2017-09-28", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "mojoomla wpams apartment management system for wordpress allows sql injection via the id parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: mojoomla wpams apartment management system for wordpress allows sql injection via the id parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-09-28\n- Last Modified Date: 2017-10-05" } ] }, { "Unnamed: 0": "CVE-2016-3343", "mod_date": "2018-10-12", "pub_date": "2016-11-10", "cvss": 9.3, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "the common log file system (clfs) driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allows local users to gain privileges via a crafted application, aka \"windows common log file system driver elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0026, cve-2016-3332, cve-2016-3333, cve-2016-3334, cve-2016-3335, cve-2016-3338, cve-2016-3340, cve-2016-3342, and cve-2016-7184.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: the common log file system (clfs) driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allows local users to gain privileges via a crafted application, aka \"windows common log file system driver elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0026, cve-2016-3332, cve-2016-3333, cve-2016-3334, cve-2016-3335, cve-2016-3338, cve-2016-3340, cve-2016-3342, and cve-2016-7184.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-10\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2008-2632", "mod_date": "2017-09-29", "pub_date": "2008-06-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the acctexp (com_acctexp) component 0.12.x and earlier for joomla! allows remote attackers to execute arbitrary sql commands via the usage parameter in a subscribe action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the acctexp (com_acctexp) component 0.12.x and earlier for joomla! allows remote attackers to execute arbitrary sql commands via the usage parameter in a subscribe action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-10\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-3061", "mod_date": "2009-09-04", "pub_date": "2009-09-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in lesson.php in alqatari q r script 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in lesson.php in alqatari q r script 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-03\n- Last Modified Date: 2009-09-04" } ] }, { "Unnamed: 0": "CVE-2007-5189", "mod_date": "2018-10-15", "pub_date": "2007-10-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in mes_add.php in x-script guestbook 1.3a, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) name, (2) email, (3) icq, and (4) website parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in mes_add.php in x-script guestbook 1.3a, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) name, (2) email, (3) icq, and (4) website parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-10-03\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2018-6493", "mod_date": "2019-10-09", "pub_date": "2018-05-22", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection in hp network operations management ultimate, version 2017.07, 2017.11, 2018.02 and in network automation, version 10.00, 10.10, 10.11, 10.20, 10.30, 10.40, 10.50. this vulnerability could be remotely exploited to allow remote sql injection.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection in hp network operations management ultimate, version 2017.07, 2017.11, 2018.02 and in network automation, version 10.00, 10.10, 10.11, 10.20, 10.30, 10.40, 10.50. this vulnerability could be remotely exploited to allow remote sql injection.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-22\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2008-5775", "mod_date": "2017-09-29", "pub_date": "2008-12-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in categories.php in aperto blog 0.1.1 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in categories.php in aperto blog 0.1.1 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-30\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-2523", "mod_date": "2017-08-08", "pub_date": "2008-06-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the autopatcher server plugin in raknet before 3.23 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the autopatcher server plugin in raknet before 3.23 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-03\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2013-7139", "mod_date": "2014-01-10", "pub_date": "2014-01-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in download.php in horizon quick content management system (qcms) 4.0 and earlier allows remote to execute arbitrary sql commands via the category parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in download.php in horizon quick content management system (qcms) 4.0 and earlier allows remote to execute arbitrary sql commands via the category parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-01-09\n- Last Modified Date: 2014-01-10" } ] }, { "Unnamed: 0": "CVE-2006-1501", "mod_date": "2017-07-20", "pub_date": "2006-03-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in oneorzero 1.6.3.0 allows remote attackers to execute arbitrary sql commands via the id parameter, possibly in the kans action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in oneorzero 1.6.3.0 allows remote attackers to execute arbitrary sql commands via the id parameter, possibly in the kans action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-03-30\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2019-1316", "mod_date": "2019-10-11", "pub_date": "2019-10-10", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists in microsoft windows setup when it does not properly handle privileges, aka 'microsoft windows setup elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists in microsoft windows setup when it does not properly handle privileges, aka 'microsoft windows setup elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-10-10\n- Last Modified Date: 2019-10-11" } ] }, { "Unnamed: 0": "CVE-2010-4911", "mod_date": "2017-08-29", "pub_date": "2011-10-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in classi/detail.php in php classifieds ads allows remote attackers to execute arbitrary sql commands via the sid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in classi/detail.php in php classifieds ads allows remote attackers to execute arbitrary sql commands via the sid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-10-08\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2002-2391", "mod_date": "2008-09-05", "pub_date": "2002-12-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php of webchat 1.5 included in xoops 1.0 allows remote attackers to execute arbitrary sql commands via the roomid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php of webchat 1.5 included in xoops 1.0 allows remote attackers to execute arbitrary sql commands via the roomid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2002-12-31\n- Last Modified Date: 2008-09-05" } ] }, { "Unnamed: 0": "CVE-2018-4032", "mod_date": "2019-01-17", "pub_date": "2019-01-10", "cvss": 6.6, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "an exploitable privilege escalation vulnerability exists in the way the cleanmymac x software improperly validates inputs. an attacker with local access could use this vulnerability to modify the file system as root. an attacker would need local access to the machine for a successful exploit.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "NONE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.6\n- CWE Name: Improper Input Validation\n- Summary: an exploitable privilege escalation vulnerability exists in the way the cleanmymac x software improperly validates inputs. an attacker with local access could use this vulnerability to modify the file system as root. an attacker would need local access to the machine for a successful exploit.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): NONE/COMPLETE/COMPLETE\n- Published Date: 2019-01-10\n- Last Modified Date: 2019-01-17" } ] }, { "Unnamed: 0": "CVE-2018-0685", "mod_date": "2018-12-17", "pub_date": "2018-11-15", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the denbun pop version v3.3p r4.0 and earlier allows remote authenticated attackers to execute arbitrary sql commands via http requests for mail search.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the denbun pop version v3.3p r4.0 and earlier allows remote authenticated attackers to execute arbitrary sql commands via http requests for mail search.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-11-15\n- Last Modified Date: 2018-12-17" } ] }, { "Unnamed: 0": "CVE-2018-18788", "mod_date": "2018-12-04", "pub_date": "2018-10-29", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in zzcms 8.3. sql injection exists in admin/classmanage.php via the tablename parameter. (this needs an admin user login.)", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in zzcms 8.3. sql injection exists in admin/classmanage.php via the tablename parameter. (this needs an admin user login.)\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-10-29\n- Last Modified Date: 2018-12-04" } ] }, { "Unnamed: 0": "CVE-2014-9440", "mod_date": "2017-09-08", "pub_date": "2015-01-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in browse.php in phpmyrecipes 1.2.2 allows remote attackers to execute arbitrary sql commands via the category parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in browse.php in phpmyrecipes 1.2.2 allows remote attackers to execute arbitrary sql commands via the category parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-02\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2018-0923", "mod_date": "2019-10-03", "pub_date": "2018-03-14", "cvss": 6.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "microsoft sharepoint enterprise server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka \"microsoft sharepoint elevation of privilege vulnerability\". this cve is unique from cve-2018-0909, cve-2018-0910. cve-2018-0911, cve-2018-0912, cve-2018-0913 cve-2018-0914, cve-2018-0915, cve-2018-0916, cve-2018-0917, cve-2018-0921, cve-2018-0944 and cve-2018-0947.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: microsoft sharepoint enterprise server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka \"microsoft sharepoint elevation of privilege vulnerability\". this cve is unique from cve-2018-0909, cve-2018-0910. cve-2018-0911, cve-2018-0912, cve-2018-0913 cve-2018-0914, cve-2018-0915, cve-2018-0916, cve-2018-0917, cve-2018-0921, cve-2018-0944 and cve-2018-0947.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-03-14\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2016-10233", "mod_date": "2018-05-04", "pub_date": "2018-04-04", "cvss": 10.0, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the qualcomm video driver. product: android. versions: android kernel. android id: a-34389926. references: qc-cr#897452.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 10.0\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the qualcomm video driver. product: android. versions: android kernel. android id: a-34389926. references: qc-cr#897452.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-04-04\n- Last Modified Date: 2018-05-04" } ] }, { "Unnamed: 0": "CVE-2017-11419", "mod_date": "2017-07-20", "pub_date": "2017-07-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "fiyo cms 2.0.7 has sql injection in /apps/app_article/controller/editor.php via $_post['id'] and $_post['art_title'].", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: fiyo cms 2.0.7 has sql injection in /apps/app_article/controller/editor.php via $_post['id'] and $_post['art_title'].\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-07-18\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2008-4073", "mod_date": "2017-09-29", "pub_date": "2008-09-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in zanfi autodealers cms autonline allows remote attackers to execute arbitrary sql commands via the pageid parameter in a dbpage action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in zanfi autodealers cms autonline allows remote attackers to execute arbitrary sql commands via the pageid parameter in a dbpage action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-15\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-15872", "mod_date": "2019-09-05", "pub_date": "2019-09-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the loginpress plugin before 1.1.4 for wordpress has sql injection via an import of settings.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the loginpress plugin before 1.1.4 for wordpress has sql injection via an import of settings.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-03\n- Last Modified Date: 2019-09-05" } ] }, { "Unnamed: 0": "CVE-2013-5525", "mod_date": "2017-08-29", "pub_date": "2013-10-10", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the web framework in cisco identity services engine (ise) 1.2 and earlier allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscug90502.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the web framework in cisco identity services engine (ise) 1.2 and earlier allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscug90502.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-10-10\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2013-3412", "mod_date": "2013-08-20", "pub_date": "2013-07-18", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in cisco unified communications manager (cucm) 7.1(x) through 9.1(2) allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscuh81766.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in cisco unified communications manager (cucm) 7.1(x) through 9.1(2) allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscuh81766.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-07-18\n- Last Modified Date: 2013-08-20" } ] }, { "Unnamed: 0": "CVE-2017-7410", "mod_date": "2017-07-12", "pub_date": "2017-04-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in account/signup.php and account/signup2.php in websitebaker 2.10.0 and earlier allow remote attackers to execute arbitrary sql commands via the (1) username, (2) display_name parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in account/signup.php and account/signup2.php in websitebaker 2.10.0 and earlier allow remote attackers to execute arbitrary sql commands via the (1) username, (2) display_name parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-04-03\n- Last Modified Date: 2017-07-12" } ] }, { "Unnamed: 0": "CVE-2008-6146", "mod_date": "2017-09-29", "pub_date": "2009-02-16", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in pm.php in deluxebb 1.2 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via a delete##### parameter in a delete action, a different vector than cve-2005-2989.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in pm.php in deluxebb 1.2 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via a delete##### parameter in a delete action, a different vector than cve-2005-2989.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-16\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-0381", "mod_date": "2017-09-29", "pub_date": "2009-02-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the bazaarbuilder ecommerce shopping cart (com_prod) 5.0 component for joomla! allows remote attackers to execute arbitrary sql commands via the cid parameter in a products action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the bazaarbuilder ecommerce shopping cart (com_prod) 5.0 component for joomla! allows remote attackers to execute arbitrary sql commands via the cid parameter in a products action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-02\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-5454", "mod_date": "2019-10-09", "pub_date": "2019-07-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection in the nextcloud android app prior to version 3.0.0 allows to destroy a local cache when a harmful query is executed requiring to resetup the account.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection in the nextcloud android app prior to version 3.0.0 allows to destroy a local cache when a harmful query is executed requiring to resetup the account.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-07-30\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2016-8476", "mod_date": "2017-07-25", "pub_date": "2017-02-08", "cvss": 7.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the qualcomm wi-fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-32879283. references: qc-cr#1091940.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the qualcomm wi-fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-32879283. references: qc-cr#1091940.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-02-08\n- Last Modified Date: 2017-07-25" } ] }, { "Unnamed: 0": "CVE-2007-6381", "mod_date": "2017-08-08", "pub_date": "2007-12-15", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the indexed_search system extension in typo3 3.x, 4.0 through 4.0.7, and 4.1 through 4.1.3 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the indexed_search system extension in typo3 3.x, 4.0 through 4.0.7, and 4.1 through 4.1.3 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-12-15\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2006-0115", "mod_date": "2011-09-08", "pub_date": "2006-01-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in oneplug solutions oneplug cms allow remote attackers to execute arbitrary sql commands via the (1) press_release_id parameter in press/details.asp, (2) service_id parameter in services/details.asp, and (3) product_id parameter in products/details.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in oneplug solutions oneplug cms allow remote attackers to execute arbitrary sql commands via the (1) press_release_id parameter in press/details.asp, (2) service_id parameter in services/details.asp, and (3) product_id parameter in products/details.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-01-09\n- Last Modified Date: 2011-09-08" } ] }, { "Unnamed: 0": "CVE-2009-0703", "mod_date": "2017-09-29", "pub_date": "2009-02-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in bview.asp in aspthai.net webboard 6.0 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in bview.asp in aspthai.net webboard 6.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-23\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-4374", "mod_date": "2017-09-29", "pub_date": "2008-10-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in cms buzz allows remote attackers to execute arbitrary sql commands via the id parameter in a playgame action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in cms buzz allows remote attackers to execute arbitrary sql commands via the id parameter in a playgame action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-01\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-1088", "mod_date": "2019-07-17", "pub_date": "2019-07-15", "cvss": 4.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1086, cve-2019-1087.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1086, cve-2019-1087.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-07-15\n- Last Modified Date: 2019-07-17" } ] }, { "Unnamed: 0": "CVE-2015-9330", "mod_date": "2019-08-22", "pub_date": "2019-08-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the wp-all-import plugin before 3.2.5 for wordpress has blind sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the wp-all-import plugin before 3.2.5 for wordpress has blind sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-20\n- Last Modified Date: 2019-08-22" } ] }, { "Unnamed: 0": "CVE-2015-4062", "mod_date": "2015-05-28", "pub_date": "2015-05-27", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in includes/nsp_search.php in the newstatpress plugin before 0.9.9 for wordpress allows remote authenticated users to execute arbitrary sql commands via the where1 parameter in the nsp_search page to wp-admin/admin.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in includes/nsp_search.php in the newstatpress plugin before 0.9.9 for wordpress allows remote authenticated users to execute arbitrary sql commands via the where1 parameter in the nsp_search page to wp-admin/admin.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-05-27\n- Last Modified Date: 2015-05-28" } ] }, { "Unnamed: 0": "CVE-2008-5926", "mod_date": "2017-09-29", "pub_date": "2009-01-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in login.asp in asp-dev internal e-mail system allow remote attackers to execute arbitrary sql commands via the (1) login parameter (aka user field) or the (2) password parameter (aka pass field). note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in login.asp in asp-dev internal e-mail system allow remote attackers to execute arbitrary sql commands via the (1) login parameter (aka user field) or the (2) password parameter (aka pass field). note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-21\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-2124", "mod_date": "2017-09-29", "pub_date": "2008-05-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in modules/print.asp in fipsasp fipscms allows remote attackers to execute arbitrary sql commands via the lg parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in modules/print.asp in fipsasp fipscms allows remote attackers to execute arbitrary sql commands via the lg parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-09\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-3250", "mod_date": "2017-09-29", "pub_date": "2008-07-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in arctic issue tracker 2.0.0 allows remote attackers to execute arbitrary sql commands via the filter parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in arctic issue tracker 2.0.0 allows remote attackers to execute arbitrary sql commands via the filter parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-21\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-4792", "mod_date": "2017-09-19", "pub_date": "2010-04-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in includes/content/member_content.php in bandsite cms 1.1.4 allows remote attackers to execute arbitrary sql commands via the memid parameter to members.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in includes/content/member_content.php in bandsite cms 1.1.4 allows remote attackers to execute arbitrary sql commands via the memid parameter to members.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-22\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2016-4040", "mod_date": "2016-04-22", "pub_date": "2016-04-19", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the workflow screen in dotcms before 3.3.2 allows remote administrators to execute arbitrary sql commands via the orderby parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the workflow screen in dotcms before 3.3.2 allows remote administrators to execute arbitrary sql commands via the orderby parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-04-19\n- Last Modified Date: 2016-04-22" } ] }, { "Unnamed: 0": "CVE-2019-1010248", "mod_date": "2019-07-23", "pub_date": "2019-07-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "synetics gmbh i-doit 1.12 and earlier is affected by: sql injection. the impact is: unauthenticated mysql database access. the component is: web login form. the attack vector is: an attacker can exploit the vulnerability by sending a malicious http post request. the fixed version is: 1.12.1.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: synetics gmbh i-doit 1.12 and earlier is affected by: sql injection. the impact is: unauthenticated mysql database access. the component is: web login form. the attack vector is: an attacker can exploit the vulnerability by sending a malicious http post request. the fixed version is: 1.12.1.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-07-18\n- Last Modified Date: 2019-07-23" } ] }, { "Unnamed: 0": "CVE-2010-1051", "mod_date": "2010-03-23", "pub_date": "2010-03-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in index.php in audistat 1.3 allow remote attackers to execute arbitrary sql commands via the (1) year and (2) month parameters. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in index.php in audistat 1.3 allow remote attackers to execute arbitrary sql commands via the (1) year and (2) month parameters. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-23\n- Last Modified Date: 2010-03-23" } ] }, { "Unnamed: 0": "CVE-2009-3358", "mod_date": "2017-09-19", "pub_date": "2009-09-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in profile.php in tourism scripts adult portal escort listing allows remote attackers to execute arbitrary sql commands via the user_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in profile.php in tourism scripts adult portal escort listing allows remote attackers to execute arbitrary sql commands via the user_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-24\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-0279", "mod_date": "2017-09-29", "pub_date": "2008-01-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in liretopic.php in xforum 1.4 and possibly others allows remote attackers to execute arbitrary sql commands via the topic parameter. note: the categorie parameter might also be affected.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in liretopic.php in xforum 1.4 and possibly others allows remote attackers to execute arbitrary sql commands via the topic parameter. note: the categorie parameter might also be affected.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-15\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-2914", "mod_date": "2018-10-11", "pub_date": "2008-06-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in jobseekers/jobsearch3.php (aka the search module) in php jobwebsite pro allows remote attackers to execute arbitrary sql commands via the (1) kw or (2) position parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in jobseekers/jobsearch3.php (aka the search module) in php jobwebsite pro allows remote attackers to execute arbitrary sql commands via the (1) kw or (2) position parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-30\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2008-6652", "mod_date": "2017-09-29", "pub_date": "2009-04-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in asd.php in onecms 2.5 allows remote attackers to execute arbitrary sql commands via the sitename parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in asd.php in onecms 2.5 allows remote attackers to execute arbitrary sql commands via the sitename parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-07\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-4338", "mod_date": "2017-08-17", "pub_date": "2009-12-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the flash slideshow (slideshow) extension 0.2.2 for typo3 allows remote attackers to execute arbitrary sql commands via unknown vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the flash slideshow (slideshow) extension 0.2.2 for typo3 allows remote attackers to execute arbitrary sql commands via unknown vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-12-17\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2014-10379", "mod_date": "2019-08-22", "pub_date": "2019-08-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the duplicate-post plugin before 2.6 for wordpress has sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the duplicate-post plugin before 2.6 for wordpress has sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-21\n- Last Modified Date: 2019-08-22" } ] }, { "Unnamed: 0": "CVE-2008-5796", "mod_date": "2017-08-08", "pub_date": "2008-12-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the eluna page comments (eluna_pagecomments) extension 1.1.2 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the eluna page comments (eluna_pagecomments) extension 1.1.2 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-31\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2014-6045", "mod_date": "2018-10-31", "pub_date": "2018-08-28", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in phpmyfaq before 2.8.13 allows remote authenticated users with certain permissions to execute arbitrary sql commands via vectors involving the restore function.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in phpmyfaq before 2.8.13 allows remote authenticated users with certain permissions to execute arbitrary sql commands via vectors involving the restore function.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-08-28\n- Last Modified Date: 2018-10-31" } ] }, { "Unnamed: 0": "CVE-2016-11000", "mod_date": "2019-09-20", "pub_date": "2019-09-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the wp-ultimate-exporter plugin through 1.1 for wordpress has sql injection via the export_type_name parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the wp-ultimate-exporter plugin through 1.1 for wordpress has sql injection via the export_type_name parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-20\n- Last Modified Date: 2019-09-20" } ] }, { "Unnamed: 0": "CVE-2016-9020", "mod_date": "2017-04-04", "pub_date": "2017-03-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in framework/modules/help/controllers/helpcontroller.php in exponent cms 2.3.9 and earlier allows remote attackers to execute arbitrary sql commands via the version parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in framework/modules/help/controllers/helpcontroller.php in exponent cms 2.3.9 and earlier allows remote attackers to execute arbitrary sql commands via the version parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-03-07\n- Last Modified Date: 2017-04-04" } ] }, { "Unnamed: 0": "CVE-2013-1613", "mod_date": "2013-07-08", "pub_date": "2013-07-08", "cvss": 4.7, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the management console (aka java console) on the symantec security information manager (ssim) appliance 4.7.x and 4.8.x before 4.8.1 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "MULTIPLE", "access_complexity": "LOW", "access_vector": "ADJACENT_NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.7\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the management console (aka java console) on the symantec security information manager (ssim) appliance 4.7.x and 4.8.x before 4.8.1 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: MULTIPLE\n- Access Complexity: LOW\n- Access Vector: ADJACENT_NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-07-08\n- Last Modified Date: 2013-07-08" } ] }, { "Unnamed: 0": "CVE-2008-5191", "mod_date": "2017-09-29", "pub_date": "2008-11-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in seportal 2.4 allow remote attackers to execute arbitrary sql commands via the (1) poll_id parameter to poll.php and the (2) sp_id parameter to staticpages.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in seportal 2.4 allow remote attackers to execute arbitrary sql commands via the (1) poll_id parameter to poll.php and the (2) sp_id parameter to staticpages.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-21\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-3387", "mod_date": "2018-10-12", "pub_date": "2016-10-14", "cvss": 6.8, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft internet explorer 10 and 11 and microsoft edge do not properly restrict access to private namespaces, which allows remote attackers to gain privileges via unspecified vectors, aka \"microsoft browser elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3388.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft internet explorer 10 and 11 and microsoft edge do not properly restrict access to private namespaces, which allows remote attackers to gain privileges via unspecified vectors, aka \"microsoft browser elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3388.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-10-14\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2008-5874", "mod_date": "2017-09-29", "pub_date": "2009-01-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the hotel booking reservation system (aka hbs) for joomla! allow remote attackers to execute arbitrary sql commands via the id parameter in a showhoteldetails action to index.php in the (1) com_allhotels or (2) com_5starhotels module. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the hotel booking reservation system (aka hbs) for joomla! allow remote attackers to execute arbitrary sql commands via the id parameter in a showhoteldetails action to index.php in the (1) com_allhotels or (2) com_5starhotels module. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-08\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-4466", "mod_date": "2017-09-29", "pub_date": "2008-10-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in view_products_cat.php in vastal i-tech cosmetics zone allows remote attackers to execute arbitrary sql commands via the cat_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in view_products_cat.php in vastal i-tech cosmetics zone allows remote attackers to execute arbitrary sql commands via the cat_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-07\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-3481", "mod_date": "2017-08-17", "pub_date": "2010-09-22", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in login.php in apphp php microcms 1.0.1, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) user_name and (2) password variables, possibly related to include/classes/login.php. note: some of these details are obtained from third party information. note: the password vector might not be vulnerable.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in login.php in apphp php microcms 1.0.1, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) user_name and (2) password variables, possibly related to include/classes/login.php. note: some of these details are obtained from third party information. note: the password vector might not be vulnerable.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-09-22\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2009-3175", "mod_date": "2017-09-19", "pub_date": "2009-09-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in model agency manager pro (formerly modeling agency content management script) allow remote attackers to execute arbitrary sql commands via the user_id parameter to (1) view.php, (2) photos.php, and (3) motm.php; and the (4) id parameter to forum_message.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in model agency manager pro (formerly modeling agency content management script) allow remote attackers to execute arbitrary sql commands via the user_id parameter to (1) view.php, (2) photos.php, and (3) motm.php; and the (4) id parameter to forum_message.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-11\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-3265", "mod_date": "2017-09-29", "pub_date": "2008-07-24", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the dt register (com_dtregister) 2.2.3 component for joomla! allows remote attackers to execute arbitrary sql commands via the eventid parameter in a pay_options action to index.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the dt register (com_dtregister) 2.2.3 component for joomla! allows remote attackers to execute arbitrary sql commands via the eventid parameter in a pay_options action to index.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-17578", "mod_date": "2017-12-20", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "fs crowdfunding script 1.0 has sql injection via the latest_news_details.php id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: fs crowdfunding script 1.0 has sql injection via the latest_news_details.php id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-20" } ] }, { "Unnamed: 0": "CVE-2008-6812", "mod_date": "2017-09-29", "pub_date": "2009-05-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in bukutamu.php in phpwebnews 0.2 mysql edition allows remote attackers to execute arbitrary sql commands via the det parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in bukutamu.php in phpwebnews 0.2 mysql edition allows remote attackers to execute arbitrary sql commands via the det parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-11972", "mod_date": "2019-06-07", "pub_date": "2019-06-05", "cvss": 9.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection code execution vulnerability was identified in hpe intelligent management center (imc) plat earlier than version 7.3 e0506p09.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 9.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection code execution vulnerability was identified in hpe intelligent management center (imc) plat earlier than version 7.3 e0506p09.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-06-05\n- Last Modified Date: 2019-06-07" } ] }, { "Unnamed: 0": "CVE-2008-6381", "mod_date": "2017-09-29", "pub_date": "2009-03-02", "cvss": 4.6, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in modules/adresses/viewcat.php in bcoos 1.0.13, and possibly earlier, allows remote authenticated users with addresses module permissions to execute arbitrary sql commands via the cid parameter.", "access_authentication": "SINGLE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.6\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in modules/adresses/viewcat.php in bcoos 1.0.13, and possibly earlier, allows remote authenticated users with addresses module permissions to execute arbitrary sql commands via the cid parameter.\n- Access Authentication: SINGLE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-02\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2013-3578", "mod_date": "2013-07-16", "pub_date": "2013-07-15", "cvss": 9.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the help desk application in wave embassy remote administration server (eras) allows remote authenticated users to execute arbitrary sql commands via the ct100$4maincontroller$textboxsearchvalue parameter (aka the search field), leading to execution of operating-system commands.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 9.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the help desk application in wave embassy remote administration server (eras) allows remote authenticated users to execute arbitrary sql commands via the ct100$4maincontroller$textboxsearchvalue parameter (aka the search field), leading to execution of operating-system commands.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2013-07-15\n- Last Modified Date: 2013-07-16" } ] }, { "Unnamed: 0": "CVE-2010-2096", "mod_date": "2010-05-28", "pub_date": "2010-05-27", "cvss": 7.5, "cwe_code": 22, "cwe_name": " Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "summary": "directory traversal vulnerability in index.php in cmsqlite 1.2 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the mod parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 22:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\n- Summary: directory traversal vulnerability in index.php in cmsqlite 1.2 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the mod parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-27\n- Last Modified Date: 2010-05-28" } ] }, { "Unnamed: 0": "CVE-2008-4897", "mod_date": "2017-09-29", "pub_date": "2008-11-04", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in fichiers/add_url.php in logz podcast cms 1.3.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the art parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in fichiers/add_url.php in logz podcast cms 1.3.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the art parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-04\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-1393", "mod_date": "2019-11-12", "pub_date": "2019-11-12", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-1394, cve-2019-1395, cve-2019-1396, cve-2019-1408, cve-2019-1434.", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-1394, cve-2019-1395, cve-2019-1396, cve-2019-1408, cve-2019-1434.\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-12\n- Last Modified Date: 2019-11-12" } ] }, { "Unnamed: 0": "CVE-2008-6042", "mod_date": "2017-09-29", "pub_date": "2009-02-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the re_search module in netartmedia real estate portal 2.0 allows remote attackers to execute arbitrary sql commands via the ad parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the re_search module in netartmedia real estate portal 2.0 allows remote attackers to execute arbitrary sql commands via the ad parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-03\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-10813", "mod_date": "2018-07-20", "pub_date": "2018-06-05", "cvss": 7.5, "cwe_code": 798, "cwe_name": " Use of Hard-coded Credentials", "summary": "in dedos-web 1.0, the cookie and session secrets used in the express.js application have hardcoded values that are visible in the source code published on github. an attacker can edit the contents of the session cookie and re-sign it using the hardcoded secret. due to the use of passport.js, this could lead to privilege escalation.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Use of Hard-coded Credentials." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 798:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.5\n- CWE Name: Use of Hard-coded Credentials\n- Summary: in dedos-web 1.0, the cookie and session secrets used in the express.js application have hardcoded values that are visible in the source code published on github. an attacker can edit the contents of the session cookie and re-sign it using the hardcoded secret. due to the use of passport.js, this could lead to privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-06-05\n- Last Modified Date: 2018-07-20" } ] }, { "Unnamed: 0": "CVE-2016-7182", "mod_date": "2018-10-12", "pub_date": "2016-10-14", "cvss": 10.0, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "the graphics component in microsoft windows vista sp2; windows server 2008 sp2 and r2 sp1; windows 7 sp1; windows 8.1; windows server 2012 gold and r2; windows rt 8.1; windows 10 gold, 1511, and 1607; office 2007 sp3; office 2010 sp2; word viewer; skype for business 2016; lync 2013 sp1; lync 2010; lync 2010 attendee; and live meeting 2007 console allows attackers to execute arbitrary code via a crafted true type font, aka \"true type font parsing elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 10.0\n- CWE Name: Improper Input Validation\n- Summary: the graphics component in microsoft windows vista sp2; windows server 2008 sp2 and r2 sp1; windows 7 sp1; windows 8.1; windows server 2012 gold and r2; windows rt 8.1; windows 10 gold, 1511, and 1607; office 2007 sp3; office 2010 sp2; word viewer; skype for business 2016; lync 2013 sp1; lync 2010; lync 2010 attendee; and live meeting 2007 console allows attackers to execute arbitrary code via a crafted true type font, aka \"true type font parsing elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-10-14\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2011-3836", "mod_date": "2017-08-29", "pub_date": "2011-12-24", "cvss": 6.8, "cwe_code": 352, "cwe_name": " Cross-Site Request Forgery (CSRF)", "summary": "multiple cross-site request forgery (csrf) vulnerabilities in wuzly 2.0 allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator, (2) perform cross-site scripting (xss), (3) perform sql injection, or have other unspecified impact via unknown vectors.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF)." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 352:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Cross-Site Request Forgery (CSRF)\n- Summary: multiple cross-site request forgery (csrf) vulnerabilities in wuzly 2.0 allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator, (2) perform cross-site scripting (xss), (3) perform sql injection, or have other unspecified impact via unknown vectors.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-12-24\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2018-5374", "mod_date": "2018-01-24", "pub_date": "2018-01-12", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the dbox 3d slider lite plugin through 1.2.2 for wordpress has sql injection via settings\\sliders.php (current_slider_id parameter).", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the dbox 3d slider lite plugin through 1.2.2 for wordpress has sql injection via settings\\sliders.php (current_slider_id parameter).\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-12\n- Last Modified Date: 2018-01-24" } ] }, { "Unnamed: 0": "CVE-2010-4795", "mod_date": "2017-08-17", "pub_date": "2011-04-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the js calendar (com_jscalendar) component 1.5.1 and 1.5.4 for joomla! allows remote attackers to execute arbitrary sql commands via the ev_id parameter in a details action to index.php. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the js calendar (com_jscalendar) component 1.5.1 and 1.5.4 for joomla! allows remote attackers to execute arbitrary sql commands via the ev_id parameter in a details action to index.php. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-04-27\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2010-1949", "mod_date": "2010-05-19", "pub_date": "2010-05-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the online news paper manager (com_jnewspaper) component 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the cid parameter to index.php. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the online news paper manager (com_jnewspaper) component 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the cid parameter to index.php. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-19\n- Last Modified Date: 2010-05-19" } ] }, { "Unnamed: 0": "CVE-2015-6659", "mod_date": "2016-12-24", "pub_date": "2015-08-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the sql comment filtering system in the database api in drupal 7.x before 7.39 allows remote attackers to execute arbitrary sql commands via an sql comment.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the sql comment filtering system in the database api in drupal 7.x before 7.39 allows remote attackers to execute arbitrary sql commands via an sql comment.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-08-24\n- Last Modified Date: 2016-12-24" } ] }, { "Unnamed: 0": "CVE-2008-6314", "mod_date": "2017-09-29", "pub_date": "2009-02-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in tag_board.php in the tag board module 4.0 and earlier for phpbb allows remote attackers to execute arbitrary sql commands via the id parameter in a delete action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in tag_board.php in the tag board module 4.0 and earlier for phpbb allows remote attackers to execute arbitrary sql commands via the id parameter in a delete action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-27\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-4185", "mod_date": "2017-09-29", "pub_date": "2008-09-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in webcms portal edition allows remote attackers to execute arbitrary sql commands via the id parameter in a documentos action, a different vector than cve-2008-3213.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in webcms portal edition allows remote attackers to execute arbitrary sql commands via the id parameter in a documentos action, a different vector than cve-2008-3213.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-23\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-5640", "mod_date": "2017-09-29", "pub_date": "2008-12-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in bidhistory.asp in active bids 3.5 allows remote attackers to execute arbitrary sql commands via the itemid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in bidhistory.asp in active bids 3.5 allows remote attackers to execute arbitrary sql commands via the itemid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-5033", "mod_date": "2017-08-29", "pub_date": "2011-11-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in productlist.cfm in fusebox 5.5.1 allows remote attackers to execute arbitrary sql commands via the catdisplay parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in productlist.cfm in fusebox 5.5.1 allows remote attackers to execute arbitrary sql commands via the catdisplay parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-02\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2015-2536", "mod_date": "2018-10-12", "pub_date": "2015-09-09", "cvss": 4.3, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "cross-site scripting (xss) vulnerability in microsoft lync server 2013 and skype for business server 2015 allows remote attackers to inject arbitrary web script or html via a crafted url, aka \"skype for business server and lync server xss elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.3\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: cross-site scripting (xss) vulnerability in microsoft lync server 2013 and skype for business server 2015 allows remote attackers to inject arbitrary web script or html via a crafted url, aka \"skype for business server and lync server xss elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2015-09-09\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2010-1716", "mod_date": "2017-08-17", "pub_date": "2010-05-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the agenda address book (com_agenda) component 1.0.1 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the agenda address book (com_agenda) component 1.0.1 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-04\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2010-1726", "mod_date": "2017-08-17", "pub_date": "2010-05-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in offers_buy.php in ec21 clone 3.0 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in offers_buy.php in ec21 clone 3.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-06\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2015-6099", "mod_date": "2018-10-12", "pub_date": "2015-11-11", "cvss": 4.3, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "cross-site scripting (xss) vulnerability in asp.net in microsoft .net framework 4, 4.5, 4.5.1, 4.5.2, and 4.6 allows remote attackers to inject arbitrary web script or html via a crafted value, aka \".net elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.3\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: cross-site scripting (xss) vulnerability in asp.net in microsoft .net framework 4, 4.5, 4.5.1, 4.5.2, and 4.6 allows remote attackers to inject arbitrary web script or html via a crafted value, aka \".net elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2015-11-11\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2018-6605", "mod_date": "2018-02-28", "pub_date": "2018-02-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the zh baidumap 3.0.0.1 component for joomla! via the id parameter in a getplacemarkdetails, getplacemarkhovertext, getpathhovertext, or getpathdetails request.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the zh baidumap 3.0.0.1 component for joomla! via the id parameter in a getplacemarkdetails, getplacemarkhovertext, getpathhovertext, or getpathdetails request.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-05\n- Last Modified Date: 2018-02-28" } ] }, { "Unnamed: 0": "CVE-2010-2683", "mod_date": "2010-07-12", "pub_date": "2010-07-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in result.php in customer paradigm pagedirector cms allows remote attackers to execute arbitrary sql commands via the sub_catid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in result.php in customer paradigm pagedirector cms allows remote attackers to execute arbitrary sql commands via the sub_catid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-12\n- Last Modified Date: 2010-07-12" } ] }, { "Unnamed: 0": "CVE-2015-1743", "mod_date": "2018-10-12", "pub_date": "2015-06-10", "cvss": 6.8, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft internet explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka \"internet explorer elevation of privilege vulnerability,\" a different vulnerability than cve-2015-1748.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft internet explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka \"internet explorer elevation of privilege vulnerability,\" a different vulnerability than cve-2015-1748.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-06-10\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2017-7001", "mod_date": "2018-04-27", "pub_date": "2018-04-03", "cvss": 6.8, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "an issue was discovered in certain apple products. ios before 10.3.2 is affected. macos before 10.12.5 is affected. the issue involves the \"sqlite\" component. it allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: an issue was discovered in certain apple products. ios before 10.3.2 is affected. macos before 10.12.5 is affected. the issue involves the \"sqlite\" component. it allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-04-03\n- Last Modified Date: 2018-04-27" } ] }, { "Unnamed: 0": "CVE-2005-4263", "mod_date": "2011-03-07", "pub_date": "2005-12-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the news module in envolution allows remote attackers to execute arbitrary sql commands via the (1) startrow and (2) catid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the news module in envolution allows remote attackers to execute arbitrary sql commands via the (1) startrow and (2) catid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-12-15\n- Last Modified Date: 2011-03-07" } ] }, { "Unnamed: 0": "CVE-2009-1661", "mod_date": "2018-10-10", "pub_date": "2009-05-18", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/utopic.php in utopic 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the rating parameter to index.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/utopic.php in utopic 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the rating parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-18\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2013-5117", "mod_date": "2014-03-13", "pub_date": "2014-03-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the rss page (dnnarticlerss.aspx) in the zldnn dnnarticle module before 10.1 for dotnetnuke allows remote attackers to execute arbitrary sql commands via the categoryid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the rss page (dnnarticlerss.aspx) in the zldnn dnnarticle module before 10.1 for dotnetnuke allows remote attackers to execute arbitrary sql commands via the categoryid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-03-12\n- Last Modified Date: 2014-03-13" } ] }, { "Unnamed: 0": "CVE-2008-6277", "mod_date": "2017-09-29", "pub_date": "2009-02-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in product.php in rakhisoftware price comparison script (aka shopping cart) allows remote attackers to execute arbitrary sql commands via the subcategory_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in product.php in rakhisoftware price comparison script (aka shopping cart) allows remote attackers to execute arbitrary sql commands via the subcategory_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-25\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-1014", "mod_date": "2019-10-03", "pub_date": "2018-04-12", "cvss": 4.9, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft sharepoint. this cve id is unique from cve-2018-1005, cve-2018-1032, cve-2018-1034.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.9\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft sharepoint. this cve id is unique from cve-2018-1005, cve-2018-1032, cve-2018-1034.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/NONE\n- Published Date: 2018-04-12\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2007-1962", "mod_date": "2017-10-11", "pub_date": "2007-04-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the wf-snippets 1.02 and earlier module for xoops allows remote attackers to execute arbitrary sql commands via the c parameter in a cat action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the wf-snippets 1.02 and earlier module for xoops allows remote attackers to execute arbitrary sql commands via the c parameter in a cat action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-04-11\n- Last Modified Date: 2017-10-11" } ] }, { "Unnamed: 0": "CVE-2010-2513", "mod_date": "2010-06-29", "pub_date": "2010-06-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the je ajax event calendar (com_jeajaxeventcalendar) component 1.0.5 for joomla! allows remote attackers to execute arbitrary sql commands via the view parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the je ajax event calendar (com_jeajaxeventcalendar) component 1.0.5 for joomla! allows remote attackers to execute arbitrary sql commands via the view parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-06-28\n- Last Modified Date: 2010-06-29" } ] }, { "Unnamed: 0": "CVE-2008-5959", "mod_date": "2017-09-29", "pub_date": "2009-01-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in start.asp in active test 2.1 allow remote attackers to execute arbitrary sql commands via the (1) useremail parameter (aka username field) or (2) password parameter (aka password field). note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in start.asp in active test 2.1 allow remote attackers to execute arbitrary sql commands via the (1) useremail parameter (aka username field) or (2) password parameter (aka password field). note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-23\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-0520", "mod_date": "2018-10-16", "pub_date": "2007-01-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in banner.php in unique ads (uds) 1.x allows remote attackers to execute arbitrary sql commands via the bid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in banner.php in unique ads (uds) 1.x allows remote attackers to execute arbitrary sql commands via the bid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-01-26\n- Last Modified Date: 2018-10-16" } ] }, { "Unnamed: 0": "CVE-2017-1347", "mod_date": "2017-06-27", "pub_date": "2017-06-23", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "ibm sterling b2b integrator standard edition 5.2 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 126462.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ibm sterling b2b integrator standard edition 5.2 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 126462.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-06-23\n- Last Modified Date: 2017-06-27" } ] }, { "Unnamed: 0": "CVE-2018-11373", "mod_date": "2018-06-25", "pub_date": "2018-05-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "iscripts eswap v2.4 has sql injection via the \"salelistdetailed.php\" user panel toid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: iscripts eswap v2.4 has sql injection via the \"salelistdetailed.php\" user panel toid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-22\n- Last Modified Date: 2018-06-25" } ] }, { "Unnamed: 0": "CVE-2016-8930", "mod_date": "2017-02-07", "pub_date": "2017-02-01", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "ibm kenexa lms on cloud is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ibm kenexa lms on cloud is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-02-01\n- Last Modified Date: 2017-02-07" } ] }, { "Unnamed: 0": "CVE-2008-0686", "mod_date": "2017-09-29", "pub_date": "2008-02-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the neoreferences (com_neoreferences) 1.3.1 and 1.3.3 component for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the neoreferences (com_neoreferences) 1.3.1 and 1.3.3 component for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-12\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-3213", "mod_date": "2017-09-29", "pub_date": "2008-07-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in secciones/tablon/tablon.php in webcms portal edition allows remote attackers to execute arbitrary sql commands via the id parameter to portal/index.php in a tablon action. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in secciones/tablon/tablon.php in webcms portal edition allows remote attackers to execute arbitrary sql commands via the id parameter to portal/index.php in a tablon action. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-18\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-2638", "mod_date": "2017-09-19", "pub_date": "2009-07-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the akobook (com_akobook) component 2.3 for joomla! allows remote attackers to execute arbitrary sql commands via the gbid parameter in a reply action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the akobook (com_akobook) component 2.3 for joomla! allows remote attackers to execute arbitrary sql commands via the gbid parameter in a reply action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-28\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2019-1010163", "mod_date": "2019-08-01", "pub_date": "2019-07-24", "cvss": 7.2, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "socusoft co photo 2 video converter 8.0.0 is affected by: buffer overflow - local shell-code execution and denial of service. the impact is: local privilege escalation (dependant upon conditions), shell code execution and denial-of-service. the component is: pdmlog.dll library. the attack vector is: the attacker must have access to local system (either directly, or remotley).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: socusoft co photo 2 video converter 8.0.0 is affected by: buffer overflow - local shell-code execution and denial of service. the impact is: local privilege escalation (dependant upon conditions), shell code execution and denial-of-service. the component is: pdmlog.dll library. the attack vector is: the attacker must have access to local system (either directly, or remotley).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-07-24\n- Last Modified Date: 2019-08-01" } ] }, { "Unnamed: 0": "CVE-2016-6776", "mod_date": "2017-10-19", "pub_date": "2017-01-12", "cvss": 9.3, "cwe_code": 284, "cwe_name": " Improper Access Control", "summary": "an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: kernel-3.10. android id: a-31680980. references: n-cve-2016-6776.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Access Control." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 284:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Access Control\n- Summary: an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: kernel-3.10. android id: a-31680980. references: n-cve-2016-6776.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-01-12\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2010-1045", "mod_date": "2010-03-23", "pub_date": "2010-03-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the productbook (com_productbook) component 1.0.4 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the productbook (com_productbook) component 1.0.4 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-23\n- Last Modified Date: 2010-03-23" } ] }, { "Unnamed: 0": "CVE-2009-2604", "mod_date": "2017-09-19", "pub_date": "2009-07-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in adminlogin.asp in zen help desk 2.1 allow remote attackers to execute arbitrary sql commands via the (1) userid (aka username) and (2) password parameters to admin.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in adminlogin.asp in zen help desk 2.1 allow remote attackers to execute arbitrary sql commands via the (1) userid (aka username) and (2) password parameters to admin.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-27\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-2634", "mod_date": "2017-09-29", "pub_date": "2008-06-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.asp in i-pos internet pay online store 1.3 beta and earlier allows remote attackers to execute arbitrary sql commands via the item parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.asp in i-pos internet pay online store 1.3 beta and earlier allows remote attackers to execute arbitrary sql commands via the item parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-10\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-1022", "mod_date": "2019-06-13", "pub_date": "2019-06-12", "cvss": 4.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1007, cve-2019-1021, cve-2019-1026, cve-2019-1027, cve-2019-1028.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1007, cve-2019-1021, cve-2019-1026, cve-2019-1027, cve-2019-1028.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-06-12\n- Last Modified Date: 2019-06-13" } ] }, { "Unnamed: 0": "CVE-2019-1090", "mod_date": "2019-07-17", "pub_date": "2019-07-15", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory, aka 'windows dnsrlvr.dll elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory, aka 'windows dnsrlvr.dll elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-07-15\n- Last Modified Date: 2019-07-17" } ] }, { "Unnamed: 0": "CVE-2018-6859", "mod_date": "2018-03-12", "pub_date": "2018-02-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in php scripts mall schools alert management script 2.0.2 via the login parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in php scripts mall schools alert management script 2.0.2 via the login parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-23\n- Last Modified Date: 2018-03-12" } ] }, { "Unnamed: 0": "CVE-2008-6622", "mod_date": "2017-09-29", "pub_date": "2009-04-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in choosecard.php in webbdomain post card (aka web postcards) 1.02, 1.01, and earlier allows remote attackers to execute arbitrary sql commands via the catid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in choosecard.php in webbdomain post card (aka web postcards) 1.02, 1.01, and earlier allows remote attackers to execute arbitrary sql commands via the catid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-1314", "mod_date": "2019-07-01", "pub_date": "2008-03-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the johannes hass gaestebuch 2.2 module for php-nuke allows remote attackers to execute arbitrary sql commands via the id parameter in an edit action to modules.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the johannes hass gaestebuch 2.2 module for php-nuke allows remote attackers to execute arbitrary sql commands via the id parameter in an edit action to modules.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-12\n- Last Modified Date: 2019-07-01" } ] }, { "Unnamed: 0": "CVE-2017-14843", "mod_date": "2017-10-05", "pub_date": "2017-09-28", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "mojoomla school management system for wordpress allows sql injection via the id parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: mojoomla school management system for wordpress allows sql injection via the id parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-09-28\n- Last Modified Date: 2017-10-05" } ] }, { "Unnamed: 0": "CVE-2018-19894", "mod_date": "2018-12-26", "pub_date": "2018-12-06", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "thinkcmf x2.2.2 has sql injection via the functions check() and delete() in commentadmincontroller.class.php and is exploitable with the manager privilege via the ids[] parameter in a commentadmin action.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: thinkcmf x2.2.2 has sql injection via the functions check() and delete() in commentadmincontroller.class.php and is exploitable with the manager privilege via the ids[] parameter in a commentadmin action.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-12-06\n- Last Modified Date: 2018-12-26" } ] }, { "Unnamed: 0": "CVE-2008-6401", "mod_date": "2017-09-29", "pub_date": "2009-03-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in sayfa.php in jetik-web allows remote attackers to execute arbitrary sql commands via the kat parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in sayfa.php in jetik-web allows remote attackers to execute arbitrary sql commands via the kat parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-2678", "mod_date": "2018-10-10", "pub_date": "2010-07-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in xmap (com_xmap) component for joomla! allows remote attackers to execute arbitrary sql commands via the itemid parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in xmap (com_xmap) component for joomla! allows remote attackers to execute arbitrary sql commands via the itemid parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-08\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2009-4456", "mod_date": "2013-08-28", "pub_date": "2009-12-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in news_detail.php in green desktiny 2.3.1, and possibly earlier versions, allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in news_detail.php in green desktiny 2.3.1, and possibly earlier versions, allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-12-30\n- Last Modified Date: 2013-08-28" } ] }, { "Unnamed: 0": "CVE-2019-1420", "mod_date": "2019-11-12", "pub_date": "2019-11-12", "cvss": 4.6, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists in the way that the dssvc.dll handles file creation allowing for a file overwrite or creation in a secured location, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1422, cve-2019-1423.", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists in the way that the dssvc.dll handles file creation allowing for a file overwrite or creation in a secured location, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1422, cve-2019-1423.\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-12\n- Last Modified Date: 2019-11-12" } ] }, { "Unnamed: 0": "CVE-2010-0324", "mod_date": "2010-01-18", "pub_date": "2010-01-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the customer reference list (ref_list) extension 1.0.1 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the customer reference list (ref_list) extension 1.0.1 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-15\n- Last Modified Date: 2010-01-18" } ] }, { "Unnamed: 0": "CVE-2008-4755", "mod_date": "2017-09-29", "pub_date": "2008-10-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in gotourl.php in pozscripts classified auctions script allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in gotourl.php in pozscripts classified auctions script allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-28\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-4060", "mod_date": "2017-08-17", "pub_date": "2009-11-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in includes/content/viewprod.inc.php in cubecart before 4.3.7 remote attackers to execute arbitrary sql commands via the productid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in includes/content/viewprod.inc.php in cubecart before 4.3.7 remote attackers to execute arbitrary sql commands via the productid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-11-24\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2014-4333", "mod_date": "2018-10-09", "pub_date": "2014-06-19", "cvss": 6.8, "cwe_code": 352, "cwe_name": " Cross-Site Request Forgery (CSRF)", "summary": "cross-site request forgery (csrf) vulnerability in administration/profiles.php in dolphin 7.1.4 and earlier allows remote attackers to hijack the authentication of administrators for requests that conduct sql injection attacks via the members[] parameter, related to cve-2014-3810.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF)." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 352:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Cross-Site Request Forgery (CSRF)\n- Summary: cross-site request forgery (csrf) vulnerability in administration/profiles.php in dolphin 7.1.4 and earlier allows remote attackers to hijack the authentication of administrators for requests that conduct sql injection attacks via the members[] parameter, related to cve-2014-3810.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-06-19\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2008-5778", "mod_date": "2017-09-29", "pub_date": "2008-12-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in report.php in free links directory script (flds) 1.2a allows remote attackers to execute arbitrary sql commands via the linkid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in report.php in free links directory script (flds) 1.2a allows remote attackers to execute arbitrary sql commands via the linkid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-30\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-2402", "mod_date": "2017-09-19", "pub_date": "2009-07-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the forum module in phpecho cms 2.0-rc3 allows remote attackers to execute arbitrary sql commands via the id parameter in a thread action, a different vector than cve-2008-0355.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the forum module in phpecho cms 2.0-rc3 allows remote attackers to execute arbitrary sql commands via the id parameter in a thread action, a different vector than cve-2008-0355.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-09\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2012-5683", "mod_date": "2017-08-29", "pub_date": "2014-08-14", "cvss": 6.8, "cwe_code": 352, "cwe_name": " Cross-Site Request Forgery (CSRF)", "summary": "multiple cross-site request forgery (csrf) vulnerabilities in zpanel 10.0.1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) create new ftp users via a createftp action in the ftp_management module to the default uri, (2) conduct cross-site scripting (xss) attacks via the infullname parameter in an updateaccountsettings action in the my_account module to zpanel/, or (3) conduct sql injection attacks via the inemailaddress parameter in an updateclient action in the manage_clients module to the default uri.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF)." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 352:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Cross-Site Request Forgery (CSRF)\n- Summary: multiple cross-site request forgery (csrf) vulnerabilities in zpanel 10.0.1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) create new ftp users via a createftp action in the ftp_management module to the default uri, (2) conduct cross-site scripting (xss) attacks via the infullname parameter in an updateaccountsettings action in the my_account module to zpanel/, or (3) conduct sql injection attacks via the inemailaddress parameter in an updateclient action in the manage_clients module to the default uri.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-08-14\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-0911", "mod_date": "2017-09-29", "pub_date": "2008-02-22", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in productdetails.php in iscripts multicart 2.0 allows remote authenticated users to execute arbitrary sql commands via the productid parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in productdetails.php in iscripts multicart 2.0 allows remote authenticated users to execute arbitrary sql commands via the productid parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-11415", "mod_date": "2017-07-20", "pub_date": "2017-07-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "fiyo cms 2.0.7 has sql injection in dapur/apps/app_article/sys_article.php via $_post['parent_id'], $_post['desc'], $_post['keys'], and $_post['level'].", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: fiyo cms 2.0.7 has sql injection in dapur/apps/app_article/sys_article.php via $_post['parent_id'], $_post['desc'], $_post['keys'], and $_post['level'].\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-07-18\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2018-5991", "mod_date": "2018-03-05", "pub_date": "2018-02-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the form maker 3.6.12 component for joomla! via the id, from, or to parameter in a view=stats request, a different vulnerability than cve-2015-2798.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the form maker 3.6.12 component for joomla! via the id, from, or to parameter in a view=stats request, a different vulnerability than cve-2015-2798.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-17\n- Last Modified Date: 2018-03-05" } ] }, { "Unnamed: 0": "CVE-2009-4689", "mod_date": "2010-03-11", "pub_date": "2010-03-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in php shopping cart selling website script allows remote attackers to execute arbitrary sql commands via the cid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in php shopping cart selling website script allows remote attackers to execute arbitrary sql commands via the cid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-10\n- Last Modified Date: 2010-03-11" } ] }, { "Unnamed: 0": "CVE-2011-1610", "mod_date": "2018-10-09", "pub_date": "2011-05-03", "cvss": 6.4, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in xmldirectorylist.jsp in the embedded apache http server component in cisco unified communications manager (aka cucm, formerly callmanager) 6.x before 6.1(5)su3, 7.x before 7.1(5)su4, 8.0 before 8.0(3a)su2, and 8.5 before 8.5(1)su1 allow remote attackers to execute arbitrary sql commands via the (1) f, (2) l, or (3) n parameter, aka bug id csctj42064.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.4\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in xmldirectorylist.jsp in the embedded apache http server component in cisco unified communications manager (aka cucm, formerly callmanager) 6.x before 6.1(5)su3, 7.x before 7.1(5)su4, 8.0 before 8.0(3a)su2, and 8.5 before 8.5(1)su1 allow remote attackers to execute arbitrary sql commands via the (1) f, (2) l, or (3) n parameter, aka bug id csctj42064.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/NONE\n- Published Date: 2011-05-03\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2007-6342", "mod_date": "2018-10-15", "pub_date": "2007-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the david castro authcas module (authcas.pm) 0.4 for the apache http server allows remote attackers to execute arbitrary sql commands via the session_cookie_name (session id) in a cookie.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the david castro authcas module (authcas.pm) 0.4 for the apache http server allows remote attackers to execute arbitrary sql commands via the session_cookie_name (session id) in a cookie.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-12-13\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2010-4989", "mod_date": "2017-08-29", "pub_date": "2011-11-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in main.asp in ziggurat farsi cms allows remote attackers to execute arbitrary sql commands via the grp parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in main.asp in ziggurat farsi cms allows remote attackers to execute arbitrary sql commands via the grp parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-01\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-6256", "mod_date": "2018-10-11", "pub_date": "2009-02-24", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admincp/admincalendar.php in vbulletin 3.7.3.pl1 allows remote authenticated administrators to execute arbitrary sql commands via the holidayinfo[recurring] parameter, a different vector than cve-2005-3022.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admincp/admincalendar.php in vbulletin 3.7.3.pl1 allows remote authenticated administrators to execute arbitrary sql commands via the holidayinfo[recurring] parameter, a different vector than cve-2005-3022.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-24\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2008-1650", "mod_date": "2018-10-11", "pub_date": "2008-04-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in dynamicpages/index.php in easynews 4.0 allows remote attackers to execute arbitrary sql commands via the read parameter in an edp_help_internal_news action. additional information can be found at:\r\n\r\nhttp://www.securityfocus.com/bid/28542", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in dynamicpages/index.php in easynews 4.0 allows remote attackers to execute arbitrary sql commands via the read parameter in an edp_help_internal_news action. additional information can be found at:\r\n\r\nhttp://www.securityfocus.com/bid/28542\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-02\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2008-4643", "mod_date": "2017-09-29", "pub_date": "2008-10-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in hits.php in mywebland mystats allows remote attackers to execute arbitrary sql commands via the sortby parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in hits.php in mywebland mystats allows remote attackers to execute arbitrary sql commands via the sortby parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-5511", "mod_date": "2018-10-15", "pub_date": "2007-10-17", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in workspace manager for oracle database before owm 10.2.0.4.1, owm 10.1.0.8.0, and owm 9.2.0.8.0 allows attackers to execute arbitrary sql commands via the findricset procedure in the lt package. note: this is probably covered by cve-2007-5510, but there are insufficient details to be certain.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in workspace manager for oracle database before owm 10.2.0.4.1, owm 10.1.0.8.0, and owm 9.2.0.8.0 allows attackers to execute arbitrary sql commands via the findricset procedure in the lt package. note: this is probably covered by cve-2007-5510, but there are insufficient details to be certain.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-10-17\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2008-3484", "mod_date": "2017-09-29", "pub_date": "2008-08-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in estoreaff 0.1 allows remote attackers to execute arbitrary sql commands via the cid parameter in a showcat action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in estoreaff 0.1 allows remote attackers to execute arbitrary sql commands via the cid parameter in a showcat action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-08-05\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-5346", "mod_date": "2019-03-15", "pub_date": "2017-01-12", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in inc/lib/control/backend/posts.control.php in genixcms 0.0.8 allows remote authenticated administrators to execute arbitrary sql commands via the id parameter to gxadmin/index.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in inc/lib/control/backend/posts.control.php in genixcms 0.0.8 allows remote authenticated administrators to execute arbitrary sql commands via the id parameter to gxadmin/index.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-01-12\n- Last Modified Date: 2019-03-15" } ] }, { "Unnamed: 0": "CVE-2015-1605", "mod_date": "2015-02-25", "pub_date": "2015-02-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in dell scriptlogic asset manager (aka quest workspace asset manager) before 9.5 allow remote attackers to execute arbitrary sql commands via unspecified vectors to (1) getclientpackage.aspx or (2) getprocessedpackage.aspx.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in dell scriptlogic asset manager (aka quest workspace asset manager) before 9.5 allow remote attackers to execute arbitrary sql commands via unspecified vectors to (1) getclientpackage.aspx or (2) getprocessedpackage.aspx.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-02-24\n- Last Modified Date: 2015-02-25" } ] }, { "Unnamed: 0": "CVE-2015-4018", "mod_date": "2015-06-25", "pub_date": "2015-05-21", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in feedwordpresssyndicationpage.class.php in the feedwordpress plugin before 2015.0514 for wordpress allows remote authenticated users to execute arbitrary sql commands via the link_ids[] parameter in an update action in the syndication.php page to wp-admin/admin.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in feedwordpresssyndicationpage.class.php in the feedwordpress plugin before 2015.0514 for wordpress allows remote authenticated users to execute arbitrary sql commands via the link_ids[] parameter in an update action in the syndication.php page to wp-admin/admin.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-05-21\n- Last Modified Date: 2015-06-25" } ] }, { "Unnamed: 0": "CVE-2008-6100", "mod_date": "2017-09-29", "pub_date": "2009-02-10", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in discussion forums 2k 3.3, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) catid parameter to (a) rss1.php and (b) rss2.php in misc/; and the (2) subid parameter to (c) misc/rss5.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in discussion forums 2k 3.3, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) catid parameter to (a) rss1.php and (b) rss2.php in misc/; and the (2) subid parameter to (c) misc/rss5.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-10\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-5975", "mod_date": "2017-08-08", "pub_date": "2009-01-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in links.asp in active price comparison 4.0 allows remote attackers to execute arbitrary sql commands via the linkid parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in links.asp in active price comparison 4.0 allows remote attackers to execute arbitrary sql commands via the linkid parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-27\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2008-6368", "mod_date": "2017-08-17", "pub_date": "2009-03-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in chipmunk guestbook 1.4m allows remote attackers to execute arbitrary sql commands via the start parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in chipmunk guestbook 1.4m allows remote attackers to execute arbitrary sql commands via the start parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-02\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2009-2618", "mod_date": "2017-09-19", "pub_date": "2009-07-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the surveys (aka ns-polls) module in mdpro (md-pro) 1.083.x allows remote attackers to execute arbitrary sql commands via the pollid parameter in a results action to modules.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the surveys (aka ns-polls) module in mdpro (md-pro) 1.083.x allows remote attackers to execute arbitrary sql commands via the pollid parameter in a results action to modules.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-27\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2019-0682", "mod_date": "2019-04-09", "pub_date": "2019-04-09", "cvss": 4.6, "cwe_code": 190, "cwe_name": " Integer Overflow or Wraparound", "summary": "an elevation of privilege vulnerability exists due to an integer overflow in windows subsystem for linux, aka 'windows subsystem for linux elevation of privilege vulnerability'. this cve id is unique from cve-2019-0689, cve-2019-0692, cve-2019-0693, cve-2019-0694.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Integer Overflow or Wraparound." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 190:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Integer Overflow or Wraparound\n- Summary: an elevation of privilege vulnerability exists due to an integer overflow in windows subsystem for linux, aka 'windows subsystem for linux elevation of privilege vulnerability'. this cve id is unique from cve-2019-0689, cve-2019-0692, cve-2019-0693, cve-2019-0694.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-04-09\n- Last Modified Date: 2019-04-09" } ] }, { "Unnamed: 0": "CVE-2009-3337", "mod_date": "2011-12-20", "pub_date": "2009-09-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the freetag (serendipity_event_freetag) plugin before 3.09 for serendipity (s9y) allows remote attackers to execute arbitrary sql commands via an unspecified parameter associated with meta keywords in a blog entry.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the freetag (serendipity_event_freetag) plugin before 3.09 for serendipity (s9y) allows remote attackers to execute arbitrary sql commands via an unspecified parameter associated with meta keywords in a blog entry.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-24\n- Last Modified Date: 2011-12-20" } ] }, { "Unnamed: 0": "CVE-2009-4436", "mod_date": "2017-08-17", "pub_date": "2009-12-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in active web softwares ewebquiz 8 allow remote attackers to execute arbitrary sql commands via the quizid parameter to (1) questions.asp, (2) importquestions.asp, and (3) quiztakers.asp, different vectors than cve-2007-1706.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in active web softwares ewebquiz 8 allow remote attackers to execute arbitrary sql commands via the quizid parameter to (1) questions.asp, (2) importquestions.asp, and (3) quiztakers.asp, different vectors than cve-2007-1706.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-12-28\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2017-17584", "mod_date": "2017-12-20", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "fs makemytrip clone 1.0 has sql injection via the show-flight-result.php fl_orig or fl_dest parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: fs makemytrip clone 1.0 has sql injection via the show-flight-result.php fl_orig or fl_dest parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-20" } ] }, { "Unnamed: 0": "CVE-2012-4990", "mod_date": "2017-08-29", "pub_date": "2012-10-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/campaign-zone-link.php in openx 2.8.10 before revision 81823 allows remote attackers to execute arbitrary sql commands via the ids[] parameter in a link action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/campaign-zone-link.php in openx 2.8.10 before revision 81823 allows remote attackers to execute arbitrary sql commands via the ids[] parameter in a link action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-10-22\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2015-4066", "mod_date": "2015-06-02", "pub_date": "2015-05-27", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in admin/handlers.php in the gigpress plugin before 2.3.9 for wordpress allow remote authenticated users to execute arbitrary sql commands via the (1) show_artist_id or (2) show_venue_id parameter in an add action in the gigpress.php page to wp-admin/admin.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in admin/handlers.php in the gigpress plugin before 2.3.9 for wordpress allow remote authenticated users to execute arbitrary sql commands via the (1) show_artist_id or (2) show_venue_id parameter in an add action in the gigpress.php page to wp-admin/admin.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-05-27\n- Last Modified Date: 2015-06-02" } ] }, { "Unnamed: 0": "CVE-2016-6818", "mod_date": "2018-12-10", "pub_date": "2017-04-13", "cvss": 10.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in sap business intelligence platform before january 2017 allows remote attackers to obtain sensitive information, modify data, cause a denial of service (data deletion), or launch administrative operations or possibly os commands via a crafted sql query. the vendor response is sap security note 2361633.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 10.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in sap business intelligence platform before january 2017 allows remote attackers to obtain sensitive information, modify data, cause a denial of service (data deletion), or launch administrative operations or possibly os commands via a crafted sql query. the vendor response is sap security note 2361633.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-04-13\n- Last Modified Date: 2018-12-10" } ] }, { "Unnamed: 0": "CVE-2009-1409", "mod_date": "2017-09-29", "pub_date": "2009-04-24", "cvss": 5.1, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in usersettings.php in e107 0.7.15 and earlier, when \"extended user fields\" is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the hide parameter, a different vector than cve-2005-4224 and cve-2008-5320.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.1\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in usersettings.php in e107 0.7.15 and earlier, when \"extended user fields\" is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the hide parameter, a different vector than cve-2005-4224 and cve-2008-5320.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-5552", "mod_date": "2019-10-09", "pub_date": "2018-03-19", "cvss": 2.1, "cwe_code": 798, "cwe_name": " Use of Hard-coded Credentials", "summary": "versions of docutrac quicdoc and office therapy that ship with dtisqlinstaller.exe version 1.6.4.0 and prior contains a hard-coded cryptographic salt, \"s@l+&pepper\".", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Use of Hard-coded Credentials." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 798:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 2.1\n- CWE Name: Use of Hard-coded Credentials\n- Summary: versions of docutrac quicdoc and office therapy that ship with dtisqlinstaller.exe version 1.6.4.0 and prior contains a hard-coded cryptographic salt, \"s@l+&pepper\".\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2018-03-19\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2010-4776", "mod_date": "2017-08-17", "pub_date": "2011-03-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in takefreestart.php in preprojects pre online tests generator pro allows remote attackers to execute arbitrary sql commands via the tid2 parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in takefreestart.php in preprojects pre online tests generator pro allows remote attackers to execute arbitrary sql commands via the tid2 parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-03-23\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2018-10204", "mod_date": "2019-10-03", "pub_date": "2018-04-18", "cvss": 9.0, "cwe_code": 732, "cwe_name": " Incorrect Permission Assignment for Critical Resource", "summary": "purevpn 6.0.1 for windows suffers from a system privilege escalation vulnerability in its \"sevpnclient\" service. when configured to use the openvpn protocol, the \"sevpnclient\" service executes \"openvpn.exe\" using the openvpn config file located at %programdata%\\purevpn\\config\\config.ovpn. this file allows \"write\" permissions to users in the \"everyone\" group. an authenticated attacker may modify this file to specify a dynamic library plugin that should run for every new vpn connection attempt. this plugin will execute code in the context of the system account.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 732:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.0\n- CWE Name: Incorrect Permission Assignment for Critical Resource\n- Summary: purevpn 6.0.1 for windows suffers from a system privilege escalation vulnerability in its \"sevpnclient\" service. when configured to use the openvpn protocol, the \"sevpnclient\" service executes \"openvpn.exe\" using the openvpn config file located at %programdata%\\purevpn\\config\\config.ovpn. this file allows \"write\" permissions to users in the \"everyone\" group. an authenticated attacker may modify this file to specify a dynamic library plugin that should run for every new vpn connection attempt. this plugin will execute code in the context of the system account.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-04-18\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2011-5278", "mod_date": "2017-08-29", "pub_date": "2014-04-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in signature.php in advanced forum signatures plugin (aka afsignatures) 2.0.4 for mybb allows remote attackers to execute arbitrary sql commands via the afs_bar_right parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in signature.php in advanced forum signatures plugin (aka afsignatures) 2.0.4 for mybb allows remote attackers to execute arbitrary sql commands via the afs_bar_right parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-04-08\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2018-18200", "mod_date": "2018-11-21", "pub_date": "2018-10-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "there is a sql injection in benutzerverwaltung in redaxo before 5.6.4.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: there is a sql injection in benutzerverwaltung in redaxo before 5.6.4.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-10-09\n- Last Modified Date: 2018-11-21" } ] }, { "Unnamed: 0": "CVE-2015-1739", "mod_date": "2018-10-12", "pub_date": "2015-06-10", "cvss": 6.8, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft internet explorer 10 and 11 allows remote attackers to gain privileges via a crafted web site, aka \"internet explorer elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft internet explorer 10 and 11 allows remote attackers to gain privileges via a crafted web site, aka \"internet explorer elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-06-10\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2016-9728", "mod_date": "2017-03-08", "pub_date": "2017-03-07", "cvss": 5.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "ibm qradar 7.2 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, information in the back-end database. ibm reference #: 1999543.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ibm qradar 7.2 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, information in the back-end database. ibm reference #: 1999543.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-03-07\n- Last Modified Date: 2017-03-08" } ] }, { "Unnamed: 0": "CVE-2013-3522", "mod_date": "2013-05-13", "pub_date": "2013-05-10", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php/ajax/api/reputation/vote in vbulletin 5.0.0 beta 11, 5.0.0 beta 28, and earlier allows remote authenticated users to execute arbitrary sql commands via the nodeid parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php/ajax/api/reputation/vote in vbulletin 5.0.0 beta 11, 5.0.0 beta 28, and earlier allows remote authenticated users to execute arbitrary sql commands via the nodeid parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-05-10\n- Last Modified Date: 2013-05-13" } ] }, { "Unnamed: 0": "CVE-2008-6166", "mod_date": "2017-09-29", "pub_date": "2009-02-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the kbase (com_kbase) 1.2 component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in an article action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the kbase (com_kbase) 1.2 component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in an article action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-19\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-3332", "mod_date": "2018-10-12", "pub_date": "2016-11-10", "cvss": 9.3, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "the common log file system (clfs) driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allows local users to gain privileges via a crafted application, aka \"windows common log file system driver elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0026, cve-2016-3333, cve-2016-3334, cve-2016-3335, cve-2016-3338, cve-2016-3340, cve-2016-3342, cve-2016-3343, and cve-2016-7184.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: the common log file system (clfs) driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allows local users to gain privileges via a crafted application, aka \"windows common log file system driver elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0026, cve-2016-3333, cve-2016-3334, cve-2016-3335, cve-2016-3338, cve-2016-3340, cve-2016-3342, cve-2016-3343, and cve-2016-7184.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-10\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2011-1556", "mod_date": "2017-08-17", "pub_date": "2011-04-04", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in plugins/pdfclasses/pdfgen.php in andy's php knowledgebase (aphpkb) 0.95.4 allows remote attackers to execute arbitrary sql commands via the pdfa parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in plugins/pdfclasses/pdfgen.php in andy's php knowledgebase (aphpkb) 0.95.4 allows remote attackers to execute arbitrary sql commands via the pdfa parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-04-04\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2009-2239", "mod_date": "2017-09-19", "pub_date": "2009-06-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the (1) casinobase (com_casinobase), (2) casino_blackjack (com_casino_blackjack), and (3) casino_videopoker (com_casino_videopoker) components 0.3.1 for joomla! allows remote attackers to execute arbitrary sql commands via the itemid parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the (1) casinobase (com_casinobase), (2) casino_blackjack (com_casino_blackjack), and (3) casino_videopoker (com_casino_videopoker) components 0.3.1 for joomla! allows remote attackers to execute arbitrary sql commands via the itemid parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-06-27\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2015-2453", "mod_date": "2019-05-15", "pub_date": "2015-08-15", "cvss": 4.7, "cwe_code": 200, "cwe_name": " Information Exposure", "summary": "the client/server run-time subsystem (csrss) in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 allows local users to obtain sensitive information via a crafted application that continues to execute during a subsequent user's login session, aka \"windows csrss elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "COMPLETE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Information Exposure." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 200:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.7\n- CWE Name: Information Exposure\n- Summary: the client/server run-time subsystem (csrss) in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 allows local users to obtain sensitive information via a crafted application that continues to execute during a subsequent user's login session, aka \"windows csrss elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/NONE/NONE\n- Published Date: 2015-08-15\n- Last Modified Date: 2019-05-15" } ] }, { "Unnamed: 0": "CVE-2018-7772", "mod_date": "2018-08-28", "pub_date": "2018-07-03", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the vulnerability exists within processing of applets which are exposed on the web service in schneider electric u.motion builder software versions prior to v1.3.4. the underlying sqlite database query to determine whether a user is logged in is subject to sql injection on the loginseed parameter, which can be embedded in the http cookie of the request.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the vulnerability exists within processing of applets which are exposed on the web service in schneider electric u.motion builder software versions prior to v1.3.4. the underlying sqlite database query to determine whether a user is logged in is subject to sql injection on the loginseed parameter, which can be embedded in the http cookie of the request.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-07-03\n- Last Modified Date: 2018-08-28" } ] }, { "Unnamed: 0": "CVE-2018-4927", "mod_date": "2018-06-22", "pub_date": "2018-05-19", "cvss": 6.8, "cwe_code": 426, "cwe_name": " Untrusted Search Path", "summary": "adobe indesign versions 13.0 and below have an exploitable untrusted search path vulnerability. successful exploitation could lead to local privilege escalation.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Untrusted Search Path." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 426:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Untrusted Search Path\n- Summary: adobe indesign versions 13.0 and below have an exploitable untrusted search path vulnerability. successful exploitation could lead to local privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-19\n- Last Modified Date: 2018-06-22" } ] }, { "Unnamed: 0": "CVE-2019-0668", "mod_date": "2019-03-06", "pub_date": "2019-03-05", "cvss": 6.5, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka 'microsoft sharepoint elevation of privilege vulnerability'.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka 'microsoft sharepoint elevation of privilege vulnerability'.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-03-05\n- Last Modified Date: 2019-03-06" } ] }, { "Unnamed: 0": "CVE-2013-1177", "mod_date": "2013-04-19", "pub_date": "2013-04-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in cisco network admission control (nac) manager before 4.8.3.1 and 4.9.x before 4.9.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors, aka bug id cscub23095.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in cisco network admission control (nac) manager before 4.8.3.1 and 4.9.x before 4.9.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors, aka bug id cscub23095.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-04-18\n- Last Modified Date: 2013-04-19" } ] }, { "Unnamed: 0": "CVE-2008-5321", "mod_date": "2017-09-29", "pub_date": "2008-12-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in gesgaleri, a module for xoops, allows remote attackers to execute arbitrary sql commands via the no parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in gesgaleri, a module for xoops, allows remote attackers to execute arbitrary sql commands via the no parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-03\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-15252", "mod_date": "2019-10-18", "pub_date": "2019-10-16", "cvss": 5.2, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "multiple vulnerabilities in cisco spa100 series analog telephone adapters (atas) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. the vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. an attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. a successful exploit could allow the attacker to execute arbitrary code with elevated privileges. note: the web-based management interface is enabled by default.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "ADJACENT_NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 5.2\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: multiple vulnerabilities in cisco spa100 series analog telephone adapters (atas) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. the vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. an attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. a successful exploit could allow the attacker to execute arbitrary code with elevated privileges. note: the web-based management interface is enabled by default.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: ADJACENT_NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-16\n- Last Modified Date: 2019-10-18" } ] }, { "Unnamed: 0": "CVE-2018-6582", "mod_date": "2018-02-28", "pub_date": "2018-02-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the zh googlemap 8.4.0.0 component for joomla! via the id parameter in a getplacemarkdetails, getplacemarkhovertext, getpathhovertext, or getpathdetails request.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the zh googlemap 8.4.0.0 component for joomla! via the id parameter in a getplacemarkdetails, getplacemarkhovertext, getpathhovertext, or getpathdetails request.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-05\n- Last Modified Date: 2018-02-28" } ] }, { "Unnamed: 0": "CVE-2010-4696", "mod_date": "2011-07-19", "pub_date": "2011-01-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in joomla! 1.5.x before 1.5.22 allow remote attackers to execute arbitrary sql commands via the (1) filter_order or (2) filter_order_dir parameter in a com_contact action to index.php, a different vulnerability than cve-2010-4166. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in joomla! 1.5.x before 1.5.22 allow remote attackers to execute arbitrary sql commands via the (1) filter_order or (2) filter_order_dir parameter in a com_contact action to index.php, a different vulnerability than cve-2010-4166. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-01-18\n- Last Modified Date: 2011-07-19" } ] }, { "Unnamed: 0": "CVE-2009-4967", "mod_date": "2010-07-28", "pub_date": "2010-07-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the car (car) extension before 0.1.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the car (car) extension before 0.1.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-28\n- Last Modified Date: 2010-07-28" } ] }, { "Unnamed: 0": "CVE-2010-2926", "mod_date": "2017-08-17", "pub_date": "2010-07-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in snews 1.7 allows remote attackers to execute arbitrary sql commands via the category parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in snews 1.7 allows remote attackers to execute arbitrary sql commands via the category parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-30\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2008-6213", "mod_date": "2017-09-29", "pub_date": "2009-02-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in mypage.php in harlandscripts pro traffic one allows remote attackers to execute arbitrary sql commands via the trg parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in mypage.php in harlandscripts pro traffic one allows remote attackers to execute arbitrary sql commands via the trg parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-20\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2011-4341", "mod_date": "2017-08-29", "pub_date": "2012-02-12", "cvss": 4.3, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "multiple sql injection vulnerabilities in symphony/content/content.publish.php in symphony cms 2.2.3 and possibly other versions before 2.2.4 allow remote authenticated users with author permissions to execute arbitrary sql commands via the filter parameter to (1) symphony/publish/comments or (2) symphony/publish/images. note: this issue can be leveraged to perform cross-site scripting (xss) attacks via error messages. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.3\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: multiple sql injection vulnerabilities in symphony/content/content.publish.php in symphony cms 2.2.3 and possibly other versions before 2.2.4 allow remote authenticated users with author permissions to execute arbitrary sql commands via the filter parameter to (1) symphony/publish/comments or (2) symphony/publish/images. note: this issue can be leveraged to perform cross-site scripting (xss) attacks via error messages. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2012-02-12\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-6627", "mod_date": "2017-09-29", "pub_date": "2009-04-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in getin.php in webbdomain webshop 1.2, 1.1, 1.02, and earlier allows remote attackers to execute arbitrary sql commands via the username parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in getin.php in webbdomain webshop 1.2, 1.1, 1.02, and earlier allows remote attackers to execute arbitrary sql commands via the username parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-11136", "mod_date": "2018-06-29", "pub_date": "2018-05-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the 'orgid' parameter received by the '/common/download_agent_installer.php' script in the quest kace system management appliance 8.0.318 is not sanitized, leading to sql injection (in particular, a blind time-based type).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the 'orgid' parameter received by the '/common/download_agent_installer.php' script in the quest kace system management appliance 8.0.318 is not sanitized, leading to sql injection (in particular, a blind time-based type).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-31\n- Last Modified Date: 2018-06-29" } ] }, { "Unnamed: 0": "CVE-2009-4720", "mod_date": "2010-06-23", "pub_date": "2010-03-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in cgi-bin/gnudip.cgi in gnudip 2.1.1 allows remote attackers to execute arbitrary sql commands via the username parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in cgi-bin/gnudip.cgi in gnudip 2.1.1 allows remote attackers to execute arbitrary sql commands via the username parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-18\n- Last Modified Date: 2010-06-23" } ] }, { "Unnamed: 0": "CVE-2010-4997", "mod_date": "2011-11-17", "pub_date": "2011-11-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in olykit swoopo clone 2010 allows remote attackers to execute arbitrary sql commands via the id parameter in a product action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in olykit swoopo clone 2010 allows remote attackers to execute arbitrary sql commands via the id parameter in a product action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-02\n- Last Modified Date: 2011-11-17" } ] }, { "Unnamed: 0": "CVE-2018-5992", "mod_date": "2018-03-02", "pub_date": "2018-02-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the staff master through 1.0 rc 1 component for joomla! via the name parameter in a view=staff request.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the staff master through 1.0 rc 1 component for joomla! via the name parameter in a view=staff request.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-17\n- Last Modified Date: 2018-03-02" } ] }, { "Unnamed: 0": "CVE-2008-2083", "mod_date": "2018-10-11", "pub_date": "2008-05-05", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in directory.php in prozilla hosting index, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the cat_id parameter in a list action.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in directory.php in prozilla hosting index, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the cat_id parameter in a list action.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-05\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2009-1316", "mod_date": "2018-10-10", "pub_date": "2009-04-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in ablespace 1.0 allow remote attackers to execute arbitrary sql commands via the (1) eid parameter to events_view.php and the (2) id parameter to events_clndr_view.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in ablespace 1.0 allow remote attackers to execute arbitrary sql commands via the (1) eid parameter to events_view.php and the (2) id parameter to events_clndr_view.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-17\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2008-1122", "mod_date": "2018-10-11", "pub_date": "2008-03-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the downloads module in koobi pro 5.7 allows remote attackers to execute arbitrary sql commands via the categ parameter to index.php. note: it was later reported that this also affects koobi cms 4.2.4, 4.2.5, and 4.3.0.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the downloads module in koobi pro 5.7 allows remote attackers to execute arbitrary sql commands via the categ parameter to index.php. note: it was later reported that this also affects koobi cms 4.2.4, 4.2.5, and 4.3.0.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-03\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2017-17570", "mod_date": "2017-12-20", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "fs expedia clone 1.0 has sql injection via the pages.php or content.php id parameter, or the show-flight-result.php fl_orig or fl_dest parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: fs expedia clone 1.0 has sql injection via the pages.php or content.php id parameter, or the show-flight-result.php fl_orig or fl_dest parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-20" } ] }, { "Unnamed: 0": "CVE-2018-10900", "mod_date": "2019-10-03", "pub_date": "2018-07-26", "cvss": 7.2, "cwe_code": 74, "cwe_name": " Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')", "summary": "network manager vpnc plugin (aka networkmanager-vpnc) before version 1.2.6 is vulnerable to a privilege escalation attack. a new line character can be used to inject a password helper parameter into the configuration data passed to vpnc, allowing an attacker to execute arbitrary commands as root.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 74:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')\n- Summary: network manager vpnc plugin (aka networkmanager-vpnc) before version 1.2.6 is vulnerable to a privilege escalation attack. a new line character can be used to inject a password helper parameter into the configuration data passed to vpnc, allowing an attacker to execute arbitrary commands as root.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-07-26\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2008-5198", "mod_date": "2017-10-11", "pub_date": "2008-11-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in memberlist.php in acmlmboard 1.a2 allows remote attackers to execute arbitrary sql commands via the pow parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in memberlist.php in acmlmboard 1.a2 allows remote attackers to execute arbitrary sql commands via the pow parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-21\n- Last Modified Date: 2017-10-11" } ] }, { "Unnamed: 0": "CVE-2008-1539", "mod_date": "2017-09-29", "pub_date": "2008-03-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in includes/dynamic_titles.php in php-nuke platinum 7.6.b.5 allows remote attackers to execute arbitrary sql commands via the p parameter to modules.php for the forums module.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in includes/dynamic_titles.php in php-nuke platinum 7.6.b.5 allows remote attackers to execute arbitrary sql commands via the p parameter to modules.php for the forums module.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-28\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-0607", "mod_date": "2019-10-03", "pub_date": "2017-05-12", "cvss": 7.6, "cwe_code": 704, "cwe_name": " Incorrect Type Conversion or Cast", "summary": "an elevation of privilege vulnerability in the qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.18. android id: a-35400551. references: qc-cr#1085928.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Type Conversion or Cast." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 704:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Incorrect Type Conversion or Cast\n- Summary: an elevation of privilege vulnerability in the qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.18. android id: a-35400551. references: qc-cr#1085928.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-05-12\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2015-7682", "mod_date": "2018-10-09", "pub_date": "2015-10-16", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in pie-register/pie-register.php in the pie register plugin before 2.0.19 for wordpress allow remote administrators to execute arbitrary sql commands via the (1) select_invitaion_code_bulk_option or (2) invi_del_id parameter in the pie-invitation-codes page to wp-admin/admin.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in pie-register/pie-register.php in the pie register plugin before 2.0.19 for wordpress allow remote administrators to execute arbitrary sql commands via the (1) select_invitaion_code_bulk_option or (2) invi_del_id parameter in the pie-invitation-codes page to wp-admin/admin.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-10-16\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2009-0395", "mod_date": "2017-09-29", "pub_date": "2009-02-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the login feature in netart media car portal 1.0 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the login feature in netart media car portal 1.0 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-03\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-3132", "mod_date": "2017-09-29", "pub_date": "2008-07-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the beamospetition (com_beamospetition) component for joomla! allows remote attackers to execute arbitrary sql commands via the pet parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the beamospetition (com_beamospetition) component for joomla! allows remote attackers to execute arbitrary sql commands via the pet parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-10\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-15970", "mod_date": "2017-11-16", "pub_date": "2017-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "php cityportal 2.0 allows sql injection via the nid parameter to index.php in a page=news action, or the cat parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: php cityportal 2.0 allows sql injection via the nid parameter to index.php in a page=news action, or the cat parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-29\n- Last Modified Date: 2017-11-16" } ] }, { "Unnamed: 0": "CVE-2018-1000890", "mod_date": "2019-01-30", "pub_date": "2018-12-28", "cvss": 5.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "frontaccounting 2.4.5 contains a time based blind sql injection vulnerability in the parameter \"filtertype\" in /attachments.php that can allow the attacker to grab the entire database of the application.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: frontaccounting 2.4.5 contains a time based blind sql injection vulnerability in the parameter \"filtertype\" in /attachments.php that can allow the attacker to grab the entire database of the application.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2018-12-28\n- Last Modified Date: 2019-01-30" } ] }, { "Unnamed: 0": "CVE-2016-2126", "mod_date": "2018-05-11", "pub_date": "2017-05-11", "cvss": 4.0, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the pac (privilege attribute certificate) checksum. a remote, authenticated, attacker can cause the winbindd process to crash using a legitimate kerberos ticket. a local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.0\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the pac (privilege attribute certificate) checksum. a remote, authenticated, attacker can cause the winbindd process to crash using a legitimate kerberos ticket. a local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/PARTIAL\n- Published Date: 2017-05-11\n- Last Modified Date: 2018-05-11" } ] }, { "Unnamed: 0": "CVE-2017-6571", "mod_date": "2019-03-19", "pub_date": "2017-03-09", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection issue is exploitable, with wordpress admin access, in the mail masta (aka mail-masta) plugin 1.0 for wordpress. this affects ./inc/campaign/view-campaign.php with the get parameter: id.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection issue is exploitable, with wordpress admin access, in the mail masta (aka mail-masta) plugin 1.0 for wordpress. this affects ./inc/campaign/view-campaign.php with the get parameter: id.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-03-09\n- Last Modified Date: 2019-03-19" } ] }, { "Unnamed: 0": "CVE-2018-6410", "mod_date": "2018-06-28", "pub_date": "2018-05-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in appnitro machform before 4.2.3. there is a download.php sql injection via the q parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in appnitro machform before 4.2.3. there is a download.php sql injection via the q parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-26\n- Last Modified Date: 2018-06-28" } ] }, { "Unnamed: 0": "CVE-2013-4882", "mod_date": "2013-08-22", "pub_date": "2013-07-22", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in mcafee epolicy orchestrator 4.6.6 and earlier, and the epolicy orchestrator (epo) extension for mcafee agent (ma) 4.5 and 4.6, allow remote authenticated users to execute arbitrary sql commands via the uid parameter to (1) core/showregisteredtypedetails.do and (2) epoagentmeta/displaymsapropsdetail.do, a different vulnerability than cve-2013-0140.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in mcafee epolicy orchestrator 4.6.6 and earlier, and the epolicy orchestrator (epo) extension for mcafee agent (ma) 4.5 and 4.6, allow remote authenticated users to execute arbitrary sql commands via the uid parameter to (1) core/showregisteredtypedetails.do and (2) epoagentmeta/displaymsapropsdetail.do, a different vulnerability than cve-2013-0140.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-07-22\n- Last Modified Date: 2013-08-22" } ] }, { "Unnamed: 0": "CVE-2011-2005", "mod_date": "2019-02-26", "pub_date": "2011-10-12", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "afd.sys in the ancillary function driver in microsoft windows xp sp2 and sp3 and server 2003 sp2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka \"ancillary function driver elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: afd.sys in the ancillary function driver in microsoft windows xp sp2 and sp3 and server 2003 sp2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka \"ancillary function driver elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2011-10-12\n- Last Modified Date: 2019-02-26" } ] }, { "Unnamed: 0": "CVE-2018-16159", "mod_date": "2018-10-19", "pub_date": "2018-08-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the gift vouchers plugin through 2.0.1 for wordpress allows sql injection via the template_id parameter in a wp-admin/admin-ajax.php wpgv_doajax_front_template request.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the gift vouchers plugin through 2.0.1 for wordpress allows sql injection via the template_id parameter in a wp-admin/admin-ajax.php wpgv_doajax_front_template request.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-08-30\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2015-3313", "mod_date": "2017-09-11", "pub_date": "2017-09-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in wordpress community events plugin before 1.4.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in wordpress community events plugin before 1.4.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-09-07\n- Last Modified Date: 2017-09-11" } ] }, { "Unnamed: 0": "CVE-2011-1653", "mod_date": "2018-10-09", "pub_date": "2011-04-18", "cvss": 10.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the unified network control (unc) server in ca total defense (td) r12 before se2 allow remote attackers to execute arbitrary sql commands via vectors involving the (1) unassignfunctionalroles, (2) unassignadminroles, (3) deletefilter, (4) nonassigneduserlist, (5) deletereportlayout, (6) deletereports, and (7) regeneratereport stored procedures.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 10.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the unified network control (unc) server in ca total defense (td) r12 before se2 allow remote attackers to execute arbitrary sql commands via vectors involving the (1) unassignfunctionalroles, (2) unassignadminroles, (3) deletefilter, (4) nonassigneduserlist, (5) deletereportlayout, (6) deletereports, and (7) regeneratereport stored procedures.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2011-04-18\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2010-1493", "mod_date": "2017-08-17", "pub_date": "2010-04-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the awdwall (com_awdwall) component before 1.5.5 for joomla! allows remote attackers to execute arbitrary sql commands via the cbuser parameter in an awdwall action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the awdwall (com_awdwall) component before 1.5.5 for joomla! allows remote attackers to execute arbitrary sql commands via the cbuser parameter in an awdwall action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-23\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2011-1130", "mod_date": "2012-12-20", "pub_date": "2011-06-21", "cvss": 7.5, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "simple machines forum (smf) before 1.1.13, and 2.x before 2.0 rc5, does not properly validate the start parameter, which might allow remote attackers to conduct sql injection attacks, obtain sensitive information, or cause a denial of service via a crafted value, related to the cleanrequest function in querystring.php and the constructpageindex function in subs.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Input Validation\n- Summary: simple machines forum (smf) before 1.1.13, and 2.x before 2.0 rc5, does not properly validate the start parameter, which might allow remote attackers to conduct sql injection attacks, obtain sensitive information, or cause a denial of service via a crafted value, related to the cleanrequest function in querystring.php and the constructpageindex function in subs.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-06-21\n- Last Modified Date: 2012-12-20" } ] }, { "Unnamed: 0": "CVE-2019-1211", "mod_date": "2019-08-20", "pub_date": "2019-08-14", "cvss": 3.7, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists in git for visual studio when it improperly parses configuration files, aka 'git for visual studio elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.7\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists in git for visual studio when it improperly parses configuration files, aka 'git for visual studio elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-14\n- Last Modified Date: 2019-08-20" } ] }, { "Unnamed: 0": "CVE-2014-5017", "mod_date": "2014-07-22", "pub_date": "2014-07-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in cpdb in application/controllers/admin/participantsaction.php in limesurvey 2.05+ build 140618 allows remote attackers to execute arbitrary sql commands via the sidx parameter in a json request to admin/participants/sa/getparticipants_json, related to a search parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in cpdb in application/controllers/admin/participantsaction.php in limesurvey 2.05+ build 140618 allows remote attackers to execute arbitrary sql commands via the sidx parameter in a json request to admin/participants/sa/getparticipants_json, related to a search parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-07-21\n- Last Modified Date: 2014-07-22" } ] }, { "Unnamed: 0": "CVE-2008-3406", "mod_date": "2017-09-29", "pub_date": "2008-07-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in showcat.php in phplinkat 0.1 allows remote attackers to execute arbitrary sql commands via the catid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in showcat.php in phplinkat 0.1 allows remote attackers to execute arbitrary sql commands via the catid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-31\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-3975", "mod_date": "2017-09-19", "pub_date": "2009-11-18", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in moa gallery 1.1.0 and 1.2.0 allows remote attackers to execute arbitrary sql commands via the gallery_id parameter in a gallery_view action.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in moa gallery 1.1.0 and 1.2.0 allows remote attackers to execute arbitrary sql commands via the gallery_id parameter in a gallery_view action.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-11-18\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-0825", "mod_date": "2011-03-08", "pub_date": "2008-02-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in claroline before 1.8.9 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in claroline before 1.8.9 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-19\n- Last Modified Date: 2011-03-08" } ] }, { "Unnamed: 0": "CVE-2008-6348", "mod_date": "2017-09-29", "pub_date": "2009-03-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in developiteasy photo gallery 1.2 allow remote attackers to execute arbitrary sql commands via the (1) cat_id parameter to gallery_category.php, (2) photo_id parameter to gallery_photo.php, and the (3) user_name and (4) user_pass parameters to admin/index.php. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in developiteasy photo gallery 1.2 allow remote attackers to execute arbitrary sql commands via the (1) cat_id parameter to gallery_category.php, (2) photo_id parameter to gallery_photo.php, and the (3) user_name and (4) user_pass parameters to admin/index.php. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-02\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-5372", "mod_date": "2018-01-24", "pub_date": "2018-01-12", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the testimonial slider plugin through 1.2.4 for wordpress has sql injection via settings\\sliders.php (current_slider_id parameter).", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the testimonial slider plugin through 1.2.4 for wordpress has sql injection via settings\\sliders.php (current_slider_id parameter).\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-12\n- Last Modified Date: 2018-01-24" } ] }, { "Unnamed: 0": "CVE-2008-4885", "mod_date": "2017-09-29", "pub_date": "2008-11-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in tr1.php in yourfreeworld scrolling text ads script allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in tr1.php in yourfreeworld scrolling text ads script allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-04\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-7128", "mod_date": "2019-03-08", "pub_date": "2017-10-23", "cvss": 7.5, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "an issue was discovered in certain apple products. ios before 11 is affected. macos before 10.13 is affected. tvos before 11 is affected. watchos before 4 is affected. the issue involves the third-party \"sqlite\" product. versions before 3.19.3 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: an issue was discovered in certain apple products. ios before 11 is affected. macos before 10.13 is affected. tvos before 11 is affected. watchos before 4 is affected. the issue involves the third-party \"sqlite\" product. versions before 3.19.3 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-23\n- Last Modified Date: 2019-03-08" } ] }, { "Unnamed: 0": "CVE-2009-1362", "mod_date": "2017-08-17", "pub_date": "2009-04-22", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in administration/index.php in chcounter 3.1.3 allows remote attackers to execute arbitrary sql commands via the login_name parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in administration/index.php in chcounter 3.1.3 allows remote attackers to execute arbitrary sql commands via the login_name parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-22\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2008-0918", "mod_date": "2017-08-08", "pub_date": "2008-02-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in includes/count_dl_or_link.inc.php in the astatspro (com_astatspro) 1.0.1 component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter to getfile.php, a different vector than cve-2008-0839. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in includes/count_dl_or_link.inc.php in the astatspro (com_astatspro) 1.0.1 component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter to getfile.php, a different vector than cve-2008-0839. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-22\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2009-0728", "mod_date": "2017-09-29", "pub_date": "2009-02-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the my_egallery module for maxdev mdpro (md-pro) and postnuke allows remote attackers to execute arbitrary sql commands via the pid parameter in a showpic action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the my_egallery module for maxdev mdpro (md-pro) and postnuke allows remote attackers to execute arbitrary sql commands via the pid parameter in a showpic action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-3332", "mod_date": "2017-09-19", "pub_date": "2009-09-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the jbudgetsmagic (com_jbudgetsmagic) component 0.3.2 through 0.4.0 for joomla! allows remote attackers to execute arbitrary sql commands via the bid parameter in a mybudget action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the jbudgetsmagic (com_jbudgetsmagic) component 0.3.2 through 0.4.0 for joomla! allows remote attackers to execute arbitrary sql commands via the bid parameter in a mybudget action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-23\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-0363", "mod_date": "2018-10-15", "pub_date": "2008-01-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in clever copy 3.0 and earlier allow remote attackers to execute arbitrary sql commands via the (1) id parameter to postcomment.php and the (2) album parameter to gallery.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in clever copy 3.0 and earlier allow remote attackers to execute arbitrary sql commands via the (1) id parameter to postcomment.php and the (2) album parameter to gallery.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-18\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2019-1607", "mod_date": "2019-10-09", "pub_date": "2019-03-08", "cvss": 7.2, "cwe_code": 77, "cwe_name": " Improper Neutralization of Special Elements used in a Command ('Command Injection')", "summary": "a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability. nexus 7000 and 7700 series switches are affected in versions prior to 6.2(22), 7.3(3)d1(1), and 8.2(3).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in a Command ('Command Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 77:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')\n- Summary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability. nexus 7000 and 7700 series switches are affected in versions prior to 6.2(22), 7.3(3)d1(1), and 8.2(3).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-03-08\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2016-8905", "mod_date": "2016-11-29", "pub_date": "2016-11-14", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the jsontags servlet in dotcms before 3.3.1 allows remote authenticated attackers to execute arbitrary sql commands via the sort parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the jsontags servlet in dotcms before 3.3.1 allows remote authenticated attackers to execute arbitrary sql commands via the sort parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-11-14\n- Last Modified Date: 2016-11-29" } ] }, { "Unnamed: 0": "CVE-2017-15963", "mod_date": "2017-11-16", "pub_date": "2017-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "itech gigs script 1.21 allows sql injection via the browse-scategory.php sc parameter or the service-provider.php ser parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: itech gigs script 1.21 allows sql injection via the browse-scategory.php sc parameter or the service-provider.php ser parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-29\n- Last Modified Date: 2017-11-16" } ] }, { "Unnamed: 0": "CVE-2017-17871", "mod_date": "2019-07-01", "pub_date": "2017-12-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the \"jextn question and answer\" extension 3.1.0 for joomla! has sql injection via the an parameter in a view=tags action, or the ques-srch parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the \"jextn question and answer\" extension 3.1.0 for joomla! has sql injection via the an parameter in a view=tags action, or the ques-srch parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-27\n- Last Modified Date: 2019-07-01" } ] }, { "Unnamed: 0": "CVE-2018-0944", "mod_date": "2019-10-03", "pub_date": "2018-03-14", "cvss": 6.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "microsoft project server 2013 sp1 and microsoft sharepoint enterprise server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka \"microsoft sharepoint elevation of privilege vulnerability\". this cve is unique from cve-2018-0909, cve-2018-0910. cve-2018-0911, cve-2018-0912, cve-2018-0913 cve-2018-0914, cve-2018-0915, cve-2018-0916, cve-2018-0917, cve-2018-0921, cve-2018-0923 and cve-2018-0947.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: microsoft project server 2013 sp1 and microsoft sharepoint enterprise server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka \"microsoft sharepoint elevation of privilege vulnerability\". this cve is unique from cve-2018-0909, cve-2018-0910. cve-2018-0911, cve-2018-0912, cve-2018-0913 cve-2018-0914, cve-2018-0915, cve-2018-0916, cve-2018-0917, cve-2018-0921, cve-2018-0923 and cve-2018-0947.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-03-14\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2008-6589", "mod_date": "2018-10-11", "pub_date": "2009-04-03", "cvss": 4.3, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "multiple cross-site scripting (xss) vulnerabilities in lightneasy \"no database\" (aka flat) version 1.2.2, and possibly sqlite version 1.2.2, allow remote attackers to inject arbitrary web script or html via the page parameter to (1) index.php and (2) lightneasy.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.3\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: multiple cross-site scripting (xss) vulnerabilities in lightneasy \"no database\" (aka flat) version 1.2.2, and possibly sqlite version 1.2.2, allow remote attackers to inject arbitrary web script or html via the page parameter to (1) index.php and (2) lightneasy.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2009-04-03\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2008-1726", "mod_date": "2017-09-29", "pub_date": "2008-04-11", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in knowledgequest 2.6, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) kqid parameter to (a) articletext.php and (b) articletextonly.php and the (2) username parameter to (c) logincheck.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in knowledgequest 2.6, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) kqid parameter to (a) articletext.php and (b) articletextonly.php and the (2) username parameter to (c) logincheck.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-11\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-5982", "mod_date": "2018-03-01", "pub_date": "2018-02-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the advertisement board 3.1.0 component for joomla! via a task=show_rss_categories&catname= request.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the advertisement board 3.1.0 component for joomla! via a task=show_rss_categories&catname= request.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-17\n- Last Modified Date: 2018-03-01" } ] }, { "Unnamed: 0": "CVE-2017-17610", "mod_date": "2017-12-26", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "e-commerce mlm software 1.0 has sql injection via the service_detail.php pid parameter, event_detail.php eventid parameter, or news_detail.php newid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: e-commerce mlm software 1.0 has sql injection via the service_detail.php pid parameter, event_detail.php eventid parameter, or news_detail.php newid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-26" } ] }, { "Unnamed: 0": "CVE-2008-3603", "mod_date": "2017-09-29", "pub_date": "2008-08-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in vacation rental script 3.0 allows remote attackers to execute arbitrary sql commands via the id parameter in a sections action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in vacation rental script 3.0 allows remote attackers to execute arbitrary sql commands via the id parameter in a sections action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-08-12\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-0831", "mod_date": "2017-09-29", "pub_date": "2009-03-05", "cvss": 6.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in members.php in the members cv (job) module 1.0 for php-fusion, when magic_quotes_gpc is disabled, allows remote authenticated users to execute arbitrary sql commands via the sortby parameter.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in members.php in the members cv (job) module 1.0 for php-fusion, when magic_quotes_gpc is disabled, allows remote authenticated users to execute arbitrary sql commands via the sortby parameter.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-05\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-5122", "mod_date": "2017-09-29", "pub_date": "2007-09-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in store_info.php in softbiz classifieds plus allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in store_info.php in softbiz classifieds plus allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-09-27\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-2950", "mod_date": "2016-12-03", "pub_date": "2016-11-30", "cvss": 4.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ibm bigfix remote control before 9.1.3 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ibm bigfix remote control before 9.1.3 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2016-11-30\n- Last Modified Date: 2016-12-03" } ] }, { "Unnamed: 0": "CVE-2018-16884", "mod_date": "2019-05-29", "pub_date": "2018-12-18", "cvss": 6.7, "cwe_code": 416, "cwe_name": " Use After Free", "summary": "a flaw was found in the linux kernel's nfs41+ subsystem. nfs41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel ids and cause a use-after-free vulnerability. thus a malicious container user can cause a host kernel memory corruption and a system panic. due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "ADJACENT_NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Use After Free." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 416:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.7\n- CWE Name: Use After Free\n- Summary: a flaw was found in the linux kernel's nfs41+ subsystem. nfs41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel ids and cause a use-after-free vulnerability. thus a malicious container user can cause a host kernel memory corruption and a system panic. due to the nature of the flaw, privilege escalation cannot be fully ruled out.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: ADJACENT_NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/COMPLETE\n- Published Date: 2018-12-18\n- Last Modified Date: 2019-05-29" } ] }, { "Unnamed: 0": "CVE-2006-0205", "mod_date": "2018-10-19", "pub_date": "2006-01-13", "cvss": 5.1, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in wordcircle 2.17 allow remote attackers to (1) execute arbitrary sql commands and bypass authentication via the password field in the login action to index.php (involving v_login.php and s_user.php) and (2) have other unknown impact via certain other fields in unspecified scripts.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.1\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in wordcircle 2.17 allow remote attackers to (1) execute arbitrary sql commands and bypass authentication via the password field in the login action to index.php (involving v_login.php and s_user.php) and (2) have other unknown impact via certain other fields in unspecified scripts.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-01-13\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2010-1016", "mod_date": "2010-03-22", "pub_date": "2010-03-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the sav filter selectors (sav_filter_selectors) extension before 1.0.5 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the sav filter selectors (sav_filter_selectors) extension before 1.0.5 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-19\n- Last Modified Date: 2010-03-22" } ] }, { "Unnamed: 0": "CVE-2008-0424", "mod_date": "2017-09-29", "pub_date": "2008-01-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in blog.php in mooseguy blog system (mgbs) 1.0 allows remote attackers to execute arbitrary sql commands via the month parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in blog.php in mooseguy blog system (mgbs) 1.0 allows remote attackers to execute arbitrary sql commands via the month parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-23\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-16894", "mod_date": "2019-09-27", "pub_date": "2019-09-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "download.php in inoerp 4.15 allows sql injection through insecure deserialization.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: download.php in inoerp 4.15 allows sql injection through insecure deserialization.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-26\n- Last Modified Date: 2019-09-27" } ] }, { "Unnamed: 0": "CVE-2017-6668", "mod_date": "2017-07-08", "pub_date": "2017-06-13", "cvss": 4.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "vulnerabilities in the web-based gui of cisco unified communications domain manager (cucdm) could allow an authenticated, remote attacker to impact the confidentiality of the system by executing arbitrary sql queries, aka sql injection. more information: cscvc52784 cscvc97648. known affected releases: 8.1(7)er1.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: vulnerabilities in the web-based gui of cisco unified communications domain manager (cucdm) could allow an authenticated, remote attacker to impact the confidentiality of the system by executing arbitrary sql queries, aka sql injection. more information: cscvc52784 cscvc97648. known affected releases: 8.1(7)er1.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-06-13\n- Last Modified Date: 2017-07-08" } ] }, { "Unnamed: 0": "CVE-2012-3365", "mod_date": "2017-12-01", "pub_date": "2012-07-20", "cvss": 5.0, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the sqlite functionality in php before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the sqlite functionality in php before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2012-07-20\n- Last Modified Date: 2017-12-01" } ] }, { "Unnamed: 0": "CVE-2011-2703", "mod_date": "2017-08-29", "pub_date": "2011-08-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in mapserver before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary sql commands via vectors related to (1) ogc filter encoding or (2) wms time support.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in mapserver before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary sql commands via vectors related to (1) ogc filter encoding or (2) wms time support.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-08-01\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-1874", "mod_date": "2017-09-29", "pub_date": "2008-04-17", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in account/user/mail.html in xpoze pro 3.05 and earlier allows remote authenticated users to execute arbitrary sql commands via the reed parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in account/user/mail.html in xpoze pro 3.05 and earlier allows remote authenticated users to execute arbitrary sql commands via the reed parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-20713", "mod_date": "2019-01-18", "pub_date": "2019-01-15", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "shopware before 5.4.3 allows sql injection by remote authenticated users, aka sw-21404.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: shopware before 5.4.3 allows sql injection by remote authenticated users, aka sw-21404.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-01-15\n- Last Modified Date: 2019-01-18" } ] }, { "Unnamed: 0": "CVE-2015-9234", "mod_date": "2017-10-06", "pub_date": "2017-09-30", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the cp-contact-form-with-paypal (aka cp contact form with paypal) plugin before 1.1.6 for wordpress has sql injection via the cp_contactformpp_id parameter to cp_contactformpp.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the cp-contact-form-with-paypal (aka cp contact form with paypal) plugin before 1.1.6 for wordpress has sql injection via the cp_contactformpp_id parameter to cp_contactformpp.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-09-30\n- Last Modified Date: 2017-10-06" } ] }, { "Unnamed: 0": "CVE-2008-1535", "mod_date": "2017-09-29", "pub_date": "2008-03-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the matti kiviharju rekry (aka com_rekry or rekry!joom) 1.0.0 component for joomla! allows remote attackers to execute arbitrary sql commands via the op_id parameter in a view action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the matti kiviharju rekry (aka com_rekry or rekry!joom) 1.0.0 component for joomla! allows remote attackers to execute arbitrary sql commands via the op_id parameter in a view action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-28\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2013-0684", "mod_date": "2013-05-09", "pub_date": "2013-05-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in invensys wonderware information server (wis) 4.0 sp1sp1, 4.5- portal, and 5.0- portal allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in invensys wonderware information server (wis) 4.0 sp1sp1, 4.5- portal, and 5.0- portal allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-05-09\n- Last Modified Date: 2013-05-09" } ] }, { "Unnamed: 0": "CVE-2018-11231", "mod_date": "2018-06-26", "pub_date": "2018-05-23", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "in the divido plugin for opencart, there is sql injection. attackers can use sql injection to get some confidential information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: in the divido plugin for opencart, there is sql injection. attackers can use sql injection to get some confidential information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-23\n- Last Modified Date: 2018-06-26" } ] }, { "Unnamed: 0": "CVE-2010-1891", "mod_date": "2019-02-26", "pub_date": "2010-09-15", "cvss": 6.9, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the client/server runtime subsystem (aka csrss) in the win32 subsystem in microsoft windows xp sp2 and sp3 and server 2003 sp2, when a chinese, japanese, or korean locale is enabled, does not properly allocate memory for transactions, which allows local users to gain privileges via a crafted application, aka \"csrss local elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the client/server runtime subsystem (aka csrss) in the win32 subsystem in microsoft windows xp sp2 and sp3 and server 2003 sp2, when a chinese, japanese, or korean locale is enabled, does not properly allocate memory for transactions, which allows local users to gain privileges via a crafted application, aka \"csrss local elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2010-09-15\n- Last Modified Date: 2019-02-26" } ] }, { "Unnamed: 0": "CVE-2008-6456", "mod_date": "2017-08-17", "pub_date": "2009-03-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the hbook (h_book) extension 2.3.0 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the hbook (h_book) extension 2.3.0 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-13\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2010-4721", "mod_date": "2011-02-15", "pub_date": "2011-02-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in news.php in immo makler allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in news.php in immo makler allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-02-01\n- Last Modified Date: 2011-02-15" } ] }, { "Unnamed: 0": "CVE-2018-8412", "mod_date": "2018-10-23", "pub_date": "2018-08-15", "cvss": 4.6, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "an elevation of privilege vulnerability exists when the microsoft autoupdate (mau) application for mac improperly validates updates before executing them, aka \"microsoft (mau) office elevation of privilege vulnerability.\" this affects microsoft office.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Improper Input Validation\n- Summary: an elevation of privilege vulnerability exists when the microsoft autoupdate (mau) application for mac improperly validates updates before executing them, aka \"microsoft (mau) office elevation of privilege vulnerability.\" this affects microsoft office.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-08-15\n- Last Modified Date: 2018-10-23" } ] }, { "Unnamed: 0": "CVE-2018-6609", "mod_date": "2018-03-01", "pub_date": "2018-02-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the jsp tickets 1.1 component for joomla! via the ticketcode parameter in a ticketlist edit action, or the id parameter in a statuslist (or prioritylist) edit action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the jsp tickets 1.1 component for joomla! via the ticketcode parameter in a ticketlist edit action, or the id parameter in a statuslist (or prioritylist) edit action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-05\n- Last Modified Date: 2018-03-01" } ] }, { "Unnamed: 0": "CVE-2018-15363", "mod_date": "2019-10-03", "pub_date": "2018-08-30", "cvss": 7.2, "cwe_code": 125, "cwe_name": " Out-of-bounds Read", "summary": "an out-of-bounds read privilege escalation vulnerability in trend micro security 2018 (consumer) products could allow a local attacker to escalate privileges on vulnerable installations. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Out-of-bounds Read." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 125:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Out-of-bounds Read\n- Summary: an out-of-bounds read privilege escalation vulnerability in trend micro security 2018 (consumer) products could allow a local attacker to escalate privileges on vulnerable installations. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-08-30\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2008-1549", "mod_date": "2018-10-11", "pub_date": "2008-03-31", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in aeries browser interface (abi) 3.8.3.14 in eagle software aries student information system allow remote attackers to execute arbitrary sql commands via the (1) grdbk parameter to gradebookoptions.asp and the (2) schlcode variable to loginproc.asp, a different vector than cve-2008-0942.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in aeries browser interface (abi) 3.8.3.14 in eagle software aries student information system allow remote attackers to execute arbitrary sql commands via the (1) grdbk parameter to gradebookoptions.asp and the (2) schlcode variable to loginproc.asp, a different vector than cve-2008-0942.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-31\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2018-15147", "mod_date": "2018-10-12", "pub_date": "2018-08-15", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in interface/forms_admin/forms_admin.php from library/registry.inc in versions of openemr before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary sql commands via the 'id' parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in interface/forms_admin/forms_admin.php from library/registry.inc in versions of openemr before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary sql commands via the 'id' parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-08-15\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2008-5365", "mod_date": "2017-10-19", "pub_date": "2008-12-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in votehistory.asp in activewebsoftwares activevotes 2.2 allows remote attackers to execute arbitrary sql commands via the accountid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in votehistory.asp in activewebsoftwares activevotes 2.2 allows remote attackers to execute arbitrary sql commands via the accountid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-08\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2003-0286", "mod_date": "2017-07-11", "pub_date": "2003-06-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in register.asp in snitz forums 2000 before 3.4.03, and possibly 3.4.07 and earlier, allows remote attackers to execute arbitrary stored procedures via the email variable.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in register.asp in snitz forums 2000 before 3.4.03, and possibly 3.4.07 and earlier, allows remote attackers to execute arbitrary stored procedures via the email variable.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2003-06-16\n- Last Modified Date: 2017-07-11" } ] }, { "Unnamed: 0": "CVE-2017-1738", "mod_date": "2019-10-09", "pub_date": "2018-07-10", "cvss": 3.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "ibm rational quality manager 5.0 through 5.0.2 and 6.0 through 6.0.5 contains an undisclosed vulnerability that would allow an authenticated user to obtain elevated privileges. ibm x-force id: 134919.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: ibm rational quality manager 5.0 through 5.0.2 and 6.0 through 6.0.5 contains an undisclosed vulnerability that would allow an authenticated user to obtain elevated privileges. ibm x-force id: 134919.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2018-07-10\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2017-0388", "mod_date": "2017-01-18", "pub_date": "2017-01-12", "cvss": 2.1, "cwe_code": 200, "cwe_name": " Information Exposure", "summary": "an elevation of privilege vulnerability in the external storage provider could enable a local secondary user to read data from an external storage sd card inserted by the primary user. this issue is rated as high because it is a general bypass for operating system protections that isolate application data from other applications. product: android. versions: 6.0, 6.0.1, 7.0, 7.1. android id: a-32523490.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Information Exposure." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 200:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 2.1\n- CWE Name: Information Exposure\n- Summary: an elevation of privilege vulnerability in the external storage provider could enable a local secondary user to read data from an external storage sd card inserted by the primary user. this issue is rated as high because it is a general bypass for operating system protections that isolate application data from other applications. product: android. versions: 6.0, 6.0.1, 7.0, 7.1. android id: a-32523490.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-01-12\n- Last Modified Date: 2017-01-18" } ] }, { "Unnamed: 0": "CVE-2012-3791", "mod_date": "2017-08-29", "pub_date": "2012-06-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in simple web content management system 1.1 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) item_delete.php, (2) item_status.php, (3) item_detail.php, (4) item_modify.php, or (5) item_position.php in admin/; or (6) status parameter to admin/item_status.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in simple web content management system 1.1 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) item_delete.php, (2) item_status.php, (3) item_detail.php, (4) item_modify.php, or (5) item_position.php in admin/; or (6) status parameter to admin/item_status.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-06-21\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2018-10647", "mod_date": "2019-10-03", "pub_date": "2018-05-02", "cvss": 7.2, "cwe_code": 732, "cwe_name": " Incorrect Permission Assignment for Critical Resource", "summary": "safervpn 4.2.5 for windows suffers from a system privilege escalation vulnerability in its \"safervpn.service\" service. the \"safervpn.service\" service executes \"openvpn.exe\" using openvpn config files located within the current user's %localappdata%\\safervpn\\ovpnconfig directory. an authenticated attacker may modify these configuration files to specify a dynamic library plugin that should run for every new vpn connection attempt. this plugin will execute code in the context of the system user.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 732:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Incorrect Permission Assignment for Critical Resource\n- Summary: safervpn 4.2.5 for windows suffers from a system privilege escalation vulnerability in its \"safervpn.service\" service. the \"safervpn.service\" service executes \"openvpn.exe\" using openvpn config files located within the current user's %localappdata%\\safervpn\\ovpnconfig directory. an authenticated attacker may modify these configuration files to specify a dynamic library plugin that should run for every new vpn connection attempt. this plugin will execute code in the context of the system user.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-05-02\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2013-4422", "mod_date": "2017-08-29", "pub_date": "2013-10-23", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in quassel irc before 0.9.1, when qt 4.8.5 or later and postgresql 8.2 or later are used, allows remote attackers to execute arbitrary sql commands via a \\ (backslash) in a message.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in quassel irc before 0.9.1, when qt 4.8.5 or later and postgresql 8.2 or later are used, allows remote attackers to execute arbitrary sql commands via a \\ (backslash) in a message.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-10-23\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2018-11511", "mod_date": "2018-10-19", "pub_date": "2018-08-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the tree list functionality in the photo gallery application in asustor adm 3.1.0.rfq3 has a sql injection vulnerability that affects the 'album_id' or 'scope' parameter via a photo-gallery/api/album/tree_lists/ uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the tree list functionality in the photo gallery application in asustor adm 3.1.0.rfq3 has a sql injection vulnerability that affects the 'album_id' or 'scope' parameter via a photo-gallery/api/album/tree_lists/ uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-08-16\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2008-5335", "mod_date": "2017-09-29", "pub_date": "2008-12-05", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in messages.php in php-fusion 6.01.15 and 7.00.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the subject and msg_send parameters, a different vector than cve-2005-3157, cve-2005-3158, cve-2005-3159, cve-2005-4005, and cve-2006-2459.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in messages.php in php-fusion 6.01.15 and 7.00.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the subject and msg_send parameters, a different vector than cve-2005-3157, cve-2005-3158, cve-2005-3159, cve-2005-4005, and cve-2006-2459.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-05\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-4751", "mod_date": "2017-08-17", "pub_date": "2010-03-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in anzeiger/start.php in swinger club portal allows remote attackers to execute arbitrary sql commands via the id parameter in a rubrik action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in anzeiger/start.php in swinger club portal allows remote attackers to execute arbitrary sql commands via the id parameter in a rubrik action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-26\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2009-3834", "mod_date": "2017-08-17", "pub_date": "2009-11-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the photoblog (com_photoblog) component alpha 3 and alpha 3a for joomla! allows remote attackers to execute arbitrary sql commands via the category parameter in a blogs action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the photoblog (com_photoblog) component alpha 3 and alpha 3a for joomla! allows remote attackers to execute arbitrary sql commands via the category parameter in a blogs action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-11-02\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2018-18923", "mod_date": "2019-01-02", "pub_date": "2018-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "abisoft ticketly 1.0 is affected by multiple sql injection vulnerabilities through the parameters name, category_id and description in action/addproject.php; kind_id, priority_id, project_id, status_id and title in action/addticket.php; and kind_id and status_id in reports.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: abisoft ticketly 1.0 is affected by multiple sql injection vulnerabilities through the parameters name, category_id and description in action/addproject.php; kind_id, priority_id, project_id, status_id and title in action/addticket.php; and kind_id and status_id in reports.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-12-13\n- Last Modified Date: 2019-01-02" } ] }, { "Unnamed: 0": "CVE-2019-9568", "mod_date": "2019-03-07", "pub_date": "2019-03-04", "cvss": 4.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the \"forminator contact form, poll & quiz builder\" plugin before 1.6 for wordpress has sql injection via the wp-admin/admin.php?page=forminator-entries entry[] parameter if the attacker has the delete permission.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the \"forminator contact form, poll & quiz builder\" plugin before 1.6 for wordpress has sql injection via the wp-admin/admin.php?page=forminator-entries entry[] parameter if the attacker has the delete permission.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2019-03-04\n- Last Modified Date: 2019-03-07" } ] }, { "Unnamed: 0": "CVE-2008-2963", "mod_date": "2017-09-29", "pub_date": "2008-07-02", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in myblog allow remote attackers to execute arbitrary sql commands via the (1) view parameter to (a) index.php, and the (2) id parameter to (b) member.php and (c) post.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in myblog allow remote attackers to execute arbitrary sql commands via the (1) view parameter to (a) index.php, and the (2) id parameter to (b) member.php and (c) post.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-02\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2012-2109", "mod_date": "2018-10-30", "pub_date": "2012-09-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in wp-load.php in the buddypress plugin 1.5.x before 1.5.5 of wordpress allows remote attackers to execute arbitrary sql commands via the page parameter in an activity_widget_filter action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in wp-load.php in the buddypress plugin 1.5.x before 1.5.5 of wordpress allows remote attackers to execute arbitrary sql commands via the page parameter in an activity_widget_filter action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-09-04\n- Last Modified Date: 2018-10-30" } ] }, { "Unnamed: 0": "CVE-2010-1918", "mod_date": "2010-05-12", "pub_date": "2010-05-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ask_chat.php in efront 3.6.2 and earlier allows remote attackers to execute arbitrary sql commands via the chatrooms_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ask_chat.php in efront 3.6.2 and earlier allows remote attackers to execute arbitrary sql commands via the chatrooms_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-12\n- Last Modified Date: 2010-05-12" } ] }, { "Unnamed: 0": "CVE-2012-4971", "mod_date": "2012-12-12", "pub_date": "2012-12-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in layton helpbox 4.4.0 allow remote attackers to execute arbitrary sql commands via the (1) reqclass parameter to editrequestenduser.asp; the (2) sys_request_id parameter to editrequestuser.asp; the (3) sys_request_id parameter to enduseractions.asp; the (4) sys_request_id or (5) confirm parameter to enduserreopenrequeststatus.asp; the (6) searchsql, (7) back, or (8) status parameter to enduserrequests.asp; the (9) sys_userpwd parameter to validateenduserlogin.asp; the (10) sys_userpwd parameter to validateuserlogin.asp; the (11) sql parameter to editenduseruser.asp; the (12) sql parameter to manageenduserrequestclasses.asp; the (13) sql parameter to resetpwdenduser.asp; the (14) sql parameter to disableloginenduser.asp; the (15) sql parameter to deleteenduseruser.asp; the (16) sql parameter to manageendusers.asp; or the (17) site parameter to statsrequestagereport.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in layton helpbox 4.4.0 allow remote attackers to execute arbitrary sql commands via the (1) reqclass parameter to editrequestenduser.asp; the (2) sys_request_id parameter to editrequestuser.asp; the (3) sys_request_id parameter to enduseractions.asp; the (4) sys_request_id or (5) confirm parameter to enduserreopenrequeststatus.asp; the (6) searchsql, (7) back, or (8) status parameter to enduserrequests.asp; the (9) sys_userpwd parameter to validateenduserlogin.asp; the (10) sys_userpwd parameter to validateuserlogin.asp; the (11) sql parameter to editenduseruser.asp; the (12) sql parameter to manageenduserrequestclasses.asp; the (13) sql parameter to resetpwdenduser.asp; the (14) sql parameter to disableloginenduser.asp; the (15) sql parameter to deleteenduseruser.asp; the (16) sql parameter to manageendusers.asp; or the (17) site parameter to statsrequestagereport.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-12-12\n- Last Modified Date: 2012-12-12" } ] }, { "Unnamed: 0": "CVE-2008-2875", "mod_date": "2017-09-29", "pub_date": "2008-06-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in webdevindo-cms 1.0.0 allows remote attackers to execute arbitrary sql commands via the hal parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in webdevindo-cms 1.0.0 allows remote attackers to execute arbitrary sql commands via the hal parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-26\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-2823", "mod_date": "2017-09-29", "pub_date": "2008-06-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in newsarchive.php in phpeasyblog (formerly phpeasynews) 1.13 rc2 and earlier allows remote attackers to execute arbitrary sql commands via the post parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in newsarchive.php in phpeasyblog (formerly phpeasynews) 1.13 rc2 and earlier allows remote attackers to execute arbitrary sql commands via the post parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-23\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-9402", "mod_date": "2017-02-05", "pub_date": "2017-01-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the moderation tool in mybb (aka mybulletinboard) before 1.8.7 and mybb merge system before 1.8.7 might allow remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the moderation tool in mybb (aka mybulletinboard) before 1.8.7 and mybb merge system before 1.8.7 might allow remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-01-31\n- Last Modified Date: 2017-02-05" } ] }, { "Unnamed: 0": "CVE-2019-1176", "mod_date": "2019-08-21", "pub_date": "2019-08-14", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists when directx improperly handles objects in memory, aka 'directx elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists when directx improperly handles objects in memory, aka 'directx elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-08-14\n- Last Modified Date: 2019-08-21" } ] }, { "Unnamed: 0": "CVE-2010-0616", "mod_date": "2018-10-10", "pub_date": "2010-02-11", "cvss": 7.5, "cwe_code": 255, "cwe_name": " Credentials Management", "summary": "evalsmsi 2.1.03 stores passwords in cleartext in the database, which allows attackers with database access to gain privileges. note: remote attack vectors are possible by leveraging a separate sql injection vulnerability.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Credentials Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 255:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Credentials Management\n- Summary: evalsmsi 2.1.03 stores passwords in cleartext in the database, which allows attackers with database access to gain privileges. note: remote attack vectors are possible by leveraging a separate sql injection vulnerability.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-02-11\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2018-8411", "mod_date": "2019-10-03", "pub_date": "2018-10-10", "cvss": 7.2, "cwe_code": 863, "cwe_name": " Incorrect Authorization", "summary": "an elevation of privilege vulnerability exists when ntfs improperly checks access, aka \"ntfs elevation of privilege vulnerability.\" this affects windows 7, windows server 2012 r2, windows rt 8.1, windows server 2008, windows server 2019, windows server 2012, windows 8.1, windows server 2016, windows server 2008 r2, windows 10, windows 10 servers.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Authorization." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 863:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Incorrect Authorization\n- Summary: an elevation of privilege vulnerability exists when ntfs improperly checks access, aka \"ntfs elevation of privilege vulnerability.\" this affects windows 7, windows server 2012 r2, windows rt 8.1, windows server 2008, windows server 2019, windows server 2012, windows 8.1, windows server 2016, windows server 2008 r2, windows 10, windows 10 servers.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-10-10\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2010-4869", "mod_date": "2017-08-29", "pub_date": "2011-10-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in dbhcms 1.1.4 allows remote attackers to execute arbitrary sql commands via the editmenu parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in dbhcms 1.1.4 allows remote attackers to execute arbitrary sql commands via the editmenu parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-10-05\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2009-4955", "mod_date": "2010-07-23", "pub_date": "2010-07-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the ultracards (th_ultracards) extension before 0.5.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the ultracards (th_ultracards) extension before 0.5.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-22\n- Last Modified Date: 2010-07-23" } ] }, { "Unnamed: 0": "CVE-2019-15564", "mod_date": "2019-08-27", "pub_date": "2019-08-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the compassion switzerland addons 10.01.4 for odoo allow sql injection in models/partner_compassion.py.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the compassion switzerland addons 10.01.4 for odoo allow sql injection in models/partner_compassion.py.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-26\n- Last Modified Date: 2019-08-27" } ] }, { "Unnamed: 0": "CVE-2007-3933", "mod_date": "2017-09-29", "pub_date": "2007-07-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in insertorder.cfm in quickestore 8.2 and earlier allows remote attackers to execute arbitrary sql commands via the cftoken parameter, a different vector than cve-2006-2053.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in insertorder.cfm in quickestore 8.2 and earlier allows remote attackers to execute arbitrary sql commands via the cftoken parameter, a different vector than cve-2006-2053.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-07-21\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-1538", "mod_date": "2017-08-17", "pub_date": "2010-04-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in print_raincheck.php in phpraincheck 1.0.1 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in print_raincheck.php in phpraincheck 1.0.1 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-26\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2016-2351", "mod_date": "2016-05-10", "pub_date": "2016-05-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in home/seos/courier/security_key2.api on the accellion file transfer appliance (fta) before fta_9_12_40 allows remote attackers to execute arbitrary sql commands via the client_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in home/seos/courier/security_key2.api on the accellion file transfer appliance (fta) before fta_9_12_40 allows remote attackers to execute arbitrary sql commands via the client_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-05-07\n- Last Modified Date: 2016-05-10" } ] }, { "Unnamed: 0": "CVE-2019-15560", "mod_date": "2019-09-03", "pub_date": "2019-08-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the reviews module before 2019-06-14 for opensource table allows sql injection in database/index.js.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the reviews module before 2019-06-14 for opensource table allows sql injection in database/index.js.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-26\n- Last Modified Date: 2019-09-03" } ] }, { "Unnamed: 0": "CVE-2009-4803", "mod_date": "2010-05-26", "pub_date": "2010-04-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the accessibility glossary (a21glossary) extension 0.4.10 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors. a fix for this vulnerability was included in 0.4.11. the latest release can be downloaded at:\r\n\r\nhttp://typo3.org/extensions/repository/view/a21glossary/current/", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the accessibility glossary (a21glossary) extension 0.4.10 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors. a fix for this vulnerability was included in 0.4.11. the latest release can be downloaded at:\r\n\r\nhttp://typo3.org/extensions/repository/view/a21glossary/current/\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-23\n- Last Modified Date: 2010-05-26" } ] }, { "Unnamed: 0": "CVE-2007-5975", "mod_date": "2018-10-15", "pub_date": "2007-11-15", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in tbsource, as used in (1) tbdev and (2) torrentstrike 0.4, allows remote authenticated users to execute arbitrary sql commands via the choice parameter. note: some of these details are obtained from third party information.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in tbsource, as used in (1) tbdev and (2) torrentstrike 0.4, allows remote authenticated users to execute arbitrary sql commands via the choice parameter. note: some of these details are obtained from third party information.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-11-15\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2019-1769", "mod_date": "2019-05-21", "pub_date": "2019-05-15", "cvss": 7.2, "cwe_code": 78, "cwe_name": " Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", "summary": "a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands on the underlying linux operating system of an attached line card with the privilege level of root. the vulnerability is due to insufficient validation of arguments passed to a specific cli command on the affected device. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying linux operating system of an attached line card with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 78:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\n- Summary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands on the underlying linux operating system of an attached line card with the privilege level of root. the vulnerability is due to insufficient validation of arguments passed to a specific cli command on the affected device. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying linux operating system of an attached line card with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-05-15\n- Last Modified Date: 2019-05-21" } ] }, { "Unnamed: 0": "CVE-2007-5308", "mod_date": "2017-09-29", "pub_date": "2007-10-09", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in galerie.php in php homepage m (phphpm) 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the id parameter in a show action.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in galerie.php in php homepage m (phphpm) 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the id parameter in a show action.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-10-09\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-3750", "mod_date": "2017-09-19", "pub_date": "2009-10-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in read.php in toylog 0.1 allows remote attackers to execute arbitrary sql commands via the idm parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in read.php in toylog 0.1 allows remote attackers to execute arbitrary sql commands via the idm parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-10-22\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2010-0461", "mod_date": "2017-08-17", "pub_date": "2010-01-28", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the casino (com_casino) component 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a (1) category or (2) player action to index.php. exploit poc reference links indicate a prerequisite of privileged authenticated user.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the casino (com_casino) component 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a (1) category or (2) player action to index.php. exploit poc reference links indicate a prerequisite of privileged authenticated user.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-28\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2013-2226", "mod_date": "2014-05-15", "pub_date": "2014-05-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in glpi before 0.83.9 allow remote attackers to execute arbitrary sql commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in glpi before 0.83.9 allow remote attackers to execute arbitrary sql commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-05-14\n- Last Modified Date: 2014-05-15" } ] }, { "Unnamed: 0": "CVE-2014-9558", "mod_date": "2017-08-31", "pub_date": "2017-08-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in smartcms v.2.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in smartcms v.2.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-08-28\n- Last Modified Date: 2017-08-31" } ] }, { "Unnamed: 0": "CVE-2017-0195", "mod_date": "2017-04-20", "pub_date": "2017-04-12", "cvss": 3.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "microsoft excel services on microsoft sharepoint server 2010 sp1 and sp2, microsoft excel web apps 2010 sp2, microsoft office web apps 2010 sp2, microsoft office web apps server 2013 sp1 and office online server allows remote attackers to perform cross-site scripting and run script with local user privileges via a crafted request, aka \"microsoft office xss elevation of privilege vulnerability.\"", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: microsoft excel services on microsoft sharepoint server 2010 sp1 and sp2, microsoft excel web apps 2010 sp2, microsoft office web apps 2010 sp2, microsoft office web apps server 2013 sp1 and office online server allows remote attackers to perform cross-site scripting and run script with local user privileges via a crafted request, aka \"microsoft office xss elevation of privilege vulnerability.\"\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2017-04-12\n- Last Modified Date: 2017-04-20" } ] }, { "Unnamed: 0": "CVE-2008-1921", "mod_date": "2018-10-11", "pub_date": "2008-04-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in store_pages/category_list.php in 5th avenue shopping cart 1.2 trial edition allows remote attackers to execute arbitrary sql commands via the category_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in store_pages/category_list.php in 5th avenue shopping cart 1.2 trial edition allows remote attackers to execute arbitrary sql commands via the category_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-23\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2018-4938", "mod_date": "2019-10-03", "pub_date": "2018-05-19", "cvss": 4.6, "cwe_code": 427, "cwe_name": " Uncontrolled Search Path Element", "summary": "adobe coldfusion update 5 and earlier versions, coldfusion 11 update 13 and earlier versions have an exploitable insecure library loading vulnerability. successful exploitation could lead to local privilege escalation.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Uncontrolled Search Path Element." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 427:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Uncontrolled Search Path Element\n- Summary: adobe coldfusion update 5 and earlier versions, coldfusion 11 update 13 and earlier versions have an exploitable insecure library loading vulnerability. successful exploitation could lead to local privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-19\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2019-1270", "mod_date": "2019-09-12", "pub_date": "2019-09-11", "cvss": 3.6, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists in windows store installer where windowsapps directory is vulnerable to symbolic link attack, aka 'microsoft windows store installer elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.6\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists in windows store installer where windowsapps directory is vulnerable to symbolic link attack, aka 'microsoft windows store installer elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/PARTIAL\n- Published Date: 2019-09-11\n- Last Modified Date: 2019-09-12" } ] }, { "Unnamed: 0": "CVE-2008-2850", "mod_date": "2017-08-08", "pub_date": "2008-06-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the trailscout module 5.x before 5.x-1.4 for drupal allows remote attackers to execute arbitrary sql commands via unspecified cookies, related to improper use of the drupal database api.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the trailscout module 5.x before 5.x-1.4 for drupal allows remote attackers to execute arbitrary sql commands via unspecified cookies, related to improper use of the drupal database api.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-25\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2017-8556", "mod_date": "2019-10-03", "pub_date": "2017-07-11", "cvss": 6.9, "cwe_code": 281, "cwe_name": " Improper Preservation of Permissions", "summary": "graphics in microsoft windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka \"microsoft graphics component elevation of privilege vulnerability\". this cve id is unique from cve-2017-8573 and cve-2017-8574.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Preservation of Permissions." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 281:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Improper Preservation of Permissions\n- Summary: graphics in microsoft windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka \"microsoft graphics component elevation of privilege vulnerability\". this cve id is unique from cve-2017-8573 and cve-2017-8574.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-07-11\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2010-0342", "mod_date": "2011-04-29", "pub_date": "2010-01-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the reports for job (job_reports) extension 0.1.0 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the reports for job (job_reports) extension 0.1.0 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-15\n- Last Modified Date: 2011-04-29" } ] }, { "Unnamed: 0": "CVE-2008-1733", "mod_date": "2018-10-11", "pub_date": "2008-04-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in puarcade.class.php 2.2 and earlier in the pragmatic utopia pu arcade (com_puarcade) component for joomla! allows remote attackers to execute arbitrary sql commands via the gid parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in puarcade.class.php 2.2 and earlier in the pragmatic utopia pu arcade (com_puarcade) component for joomla! allows remote attackers to execute arbitrary sql commands via the gid parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-11\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2018-5979", "mod_date": "2018-02-07", "pub_date": "2018-01-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in wchat fully responsive php ajax chat script 1.5 via the login.php user field.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in wchat fully responsive php ajax chat script 1.5 via the login.php user field.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-24\n- Last Modified Date: 2018-02-07" } ] }, { "Unnamed: 0": "CVE-2009-4794", "mod_date": "2018-10-10", "pub_date": "2010-04-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in community cms 0.5 allow remote attackers to execute arbitrary sql commands via the (1) article_id parameter to view.php and the (2) a parameter in an event action to calendar.php, reachable through index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in community cms 0.5 allow remote attackers to execute arbitrary sql commands via the (1) article_id parameter to view.php and the (2) a parameter in an event action to calendar.php, reachable through index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-22\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2019-1613", "mod_date": "2019-10-09", "pub_date": "2019-03-11", "cvss": 4.6, "cwe_code": 77, "cwe_name": " Improper Neutralization of Special Elements used in a Command ('Command Injection')", "summary": "a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability. mds 9000 series multilayer switches are affected running software versions prior to 6.2(27) and 8.2(3). nexus 3000 series switches are affected running software versions prior to 7.0(3)i4(9) and 7.0(3)i7(6). nexus 3500 platform switches are affected running software versions prior to 6.0(2)a8(11) and 7.0(3)i7(6). nexus 3600 platform switches are affected running software versions prior to 7.0(3)f3(5). nexus 9000 series switches in standalone nx-os mode are affected running software versions prior to 7.0(3)i4(9), 7.0(3)i7(6). nexus 9500 r-series line cards and fabric modules are affected running software versions prior to 7.0(3)f3(5). nexus 7000 and 7700 series switches are affected running software versions prior to 6.2(22) and 8.2(3).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in a Command ('Command Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 77:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')\n- Summary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability. mds 9000 series multilayer switches are affected running software versions prior to 6.2(27) and 8.2(3). nexus 3000 series switches are affected running software versions prior to 7.0(3)i4(9) and 7.0(3)i7(6). nexus 3500 platform switches are affected running software versions prior to 6.0(2)a8(11) and 7.0(3)i7(6). nexus 3600 platform switches are affected running software versions prior to 7.0(3)f3(5). nexus 9000 series switches in standalone nx-os mode are affected running software versions prior to 7.0(3)i4(9), 7.0(3)i7(6). nexus 9500 r-series line cards and fabric modules are affected running software versions prior to 7.0(3)f3(5). nexus 7000 and 7700 series switches are affected running software versions prior to 6.2(22) and 8.2(3).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-03-11\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2019-0692", "mod_date": "2019-04-09", "pub_date": "2019-04-09", "cvss": 4.6, "cwe_code": 190, "cwe_name": " Integer Overflow or Wraparound", "summary": "an elevation of privilege vulnerability exists due to an integer overflow in windows subsystem for linux, aka 'windows subsystem for linux elevation of privilege vulnerability'. this cve id is unique from cve-2019-0682, cve-2019-0689, cve-2019-0693, cve-2019-0694.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Integer Overflow or Wraparound." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 190:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Integer Overflow or Wraparound\n- Summary: an elevation of privilege vulnerability exists due to an integer overflow in windows subsystem for linux, aka 'windows subsystem for linux elevation of privilege vulnerability'. this cve id is unique from cve-2019-0682, cve-2019-0689, cve-2019-0693, cve-2019-0694.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-04-09\n- Last Modified Date: 2019-04-09" } ] }, { "Unnamed: 0": "CVE-2009-2328", "mod_date": "2017-09-19", "pub_date": "2009-07-05", "cvss": 7.5, "cwe_code": 287, "cwe_name": " Improper Authentication", "summary": "admin/edit_user.php in kervinet forum 1.1 and earlier does not require administrative authentication, which allows remote attackers to delete arbitrary accounts and conduct sql injection attacks via the del_user_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Authentication." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 287:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Authentication\n- Summary: admin/edit_user.php in kervinet forum 1.1 and earlier does not require administrative authentication, which allows remote attackers to delete arbitrary accounts and conduct sql injection attacks via the del_user_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-05\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2010-4151", "mod_date": "2018-10-10", "pub_date": "2010-11-03", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in misc.php in deluxebb 1.3, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the xthedateformat parameter in a register action, a different vector than cve-2005-2989, cve-2006-2503, and cve-2009-1033.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in misc.php in deluxebb 1.3, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the xthedateformat parameter in a register action, a different vector than cve-2005-2989, cve-2006-2503, and cve-2009-1033.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-11-03\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2010-4899", "mod_date": "2018-10-10", "pub_date": "2011-10-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in c.php in cms webmanager-pro before 8.1 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in c.php in cms webmanager-pro before 8.1 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-10-08\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2010-2436", "mod_date": "2018-10-10", "pub_date": "2010-06-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in modules/blog/index.php in anecms blog 1.3 and possibly earlier allows remote attackers to execute arbitrary sql commands via the path_info.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in modules/blog/index.php in anecms blog 1.3 and possibly earlier allows remote attackers to execute arbitrary sql commands via the path_info.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-06-24\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2018-5975", "mod_date": "2018-03-02", "pub_date": "2018-02-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the smart shoutbox 3.0.0 component for joomla! via the shoutauthor parameter to the archive uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the smart shoutbox 3.0.0 component for joomla! via the shoutauthor parameter to the archive uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-17\n- Last Modified Date: 2018-03-02" } ] }, { "Unnamed: 0": "CVE-2008-5924", "mod_date": "2009-02-05", "pub_date": "2009-01-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in diary_viewc.asp in asp-dev xm events diary allows remote attackers to execute arbitrary sql commands via the cat parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in diary_viewc.asp in asp-dev xm events diary allows remote attackers to execute arbitrary sql commands via the cat parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-21\n- Last Modified Date: 2009-02-05" } ] }, { "Unnamed: 0": "CVE-2011-3688", "mod_date": "2012-02-14", "pub_date": "2011-09-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in sonexis conferencemanager 9.3.14.0 allow remote attackers to execute arbitrary sql commands via (1) the g parameter to conference/audio/audioresourcecontainer.asp or (2) the txtconferenceid parameter to login/hostlogin.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in sonexis conferencemanager 9.3.14.0 allow remote attackers to execute arbitrary sql commands via (1) the g parameter to conference/audio/audioresourcecontainer.asp or (2) the txtconferenceid parameter to login/hostlogin.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-09-27\n- Last Modified Date: 2012-02-14" } ] }, { "Unnamed: 0": "CVE-2011-5213", "mod_date": "2017-08-29", "pub_date": "2012-10-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in browsercrm 5.100.01 and earlier allow remote attackers to execute arbitrary sql commands via the (1) login[username] parameter to index.php, (2) parent_id parameter to modules/documents/version_list.php, or (3) contact_id parameter to modules/documents/index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in browsercrm 5.100.01 and earlier allow remote attackers to execute arbitrary sql commands via the (1) login[username] parameter to index.php, (2) parent_id parameter to modules/documents/version_list.php, or (3) contact_id parameter to modules/documents/index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-10-25\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2016-10916", "mod_date": "2019-08-26", "pub_date": "2019-08-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the appointment-booking-calendar plugin before 1.1.24 for wordpress has sql injection, a different vulnerability than cve-2015-7319.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the appointment-booking-calendar plugin before 1.1.24 for wordpress has sql injection, a different vulnerability than cve-2015-7319.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-22\n- Last Modified Date: 2019-08-26" } ] }, { "Unnamed: 0": "CVE-2019-6707", "mod_date": "2019-01-24", "pub_date": "2019-01-23", "cvss": 6.5, "cwe_code": 94, "cwe_name": " Improper Control of Generation of Code ('Code Injection')", "summary": "phpshe 1.7 has sql injection via the admin.php?mod=product&act=state product_id[] parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Control of Generation of Code ('Code Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 94:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Control of Generation of Code ('Code Injection')\n- Summary: phpshe 1.7 has sql injection via the admin.php?mod=product&act=state product_id[] parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-01-23\n- Last Modified Date: 2019-01-24" } ] }, { "Unnamed: 0": "CVE-2009-0426", "mod_date": "2017-10-19", "pub_date": "2009-02-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in categorymanager/upload_image_category.asp in dmxready classified listings manager 1.1 and earlier allows remote attackers to execute arbitrary sql commands via the cid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in categorymanager/upload_image_category.asp in dmxready classified listings manager 1.1 and earlier allows remote attackers to execute arbitrary sql commands via the cid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-05\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2019-2215", "mod_date": "2019-10-18", "pub_date": "2019-10-11", "cvss": 4.6, "cwe_code": 416, "cwe_name": " Use After Free", "summary": "a use-after-free in binder.c allows an elevation of privilege from an application to the linux kernel. no user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.product: androidandroid id: a-141720095", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Use After Free." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 416:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Use After Free\n- Summary: a use-after-free in binder.c allows an elevation of privilege from an application to the linux kernel. no user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.product: androidandroid id: a-141720095\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-11\n- Last Modified Date: 2019-10-18" } ] }, { "Unnamed: 0": "CVE-2019-13076", "mod_date": "2019-11-06", "pub_date": "2019-11-06", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "quest kace systems management appliance server center 9.1.317 is vulnerable to sql injection. an authenticated user has the ability to execute arbitrary commands against the database. the affected component is /userui/ticket_list.php, and affected parameters are order[0][column] and order[0][dir].", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: quest kace systems management appliance server center 9.1.317 is vulnerable to sql injection. an authenticated user has the ability to execute arbitrary commands against the database. the affected component is /userui/ticket_list.php, and affected parameters are order[0][column] and order[0][dir].\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-06\n- Last Modified Date: 2019-11-06" } ] }, { "Unnamed: 0": "CVE-2018-10084", "mod_date": "2019-10-03", "pub_date": "2018-04-13", "cvss": 6.5, "cwe_code": 327, "cwe_name": " Use of a Broken or Risky Cryptographic Algorithm", "summary": "cms made simple (cmsms) through 2.2.6 contains a privilege escalation vulnerability from ordinary user to admin user by arranging for the eff_uid value within $_cookie[$this->_loginkey] to equal 1, because an sha-1 cryptographic protection mechanism can be bypassed.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Use of a Broken or Risky Cryptographic Algorithm." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 327:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Use of a Broken or Risky Cryptographic Algorithm\n- Summary: cms made simple (cmsms) through 2.2.6 contains a privilege escalation vulnerability from ordinary user to admin user by arranging for the eff_uid value within $_cookie[$this->_loginkey] to equal 1, because an sha-1 cryptographic protection mechanism can be bypassed.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-04-13\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2016-0036", "mod_date": "2019-05-15", "pub_date": "2016-02-10", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the remote desktop protocol (rdp) implementation in microsoft windows 7 sp1, windows 8.1, windows server 2012 gold and r2, and windows 10 allows remote authenticated users to execute arbitrary code via crafted data, aka \"remote desktop protocol (rdp) elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the remote desktop protocol (rdp) implementation in microsoft windows 7 sp1, windows 8.1, windows server 2012 gold and r2, and windows 10 allows remote authenticated users to execute arbitrary code via crafted data, aka \"remote desktop protocol (rdp) elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-02-10\n- Last Modified Date: 2019-05-15" } ] }, { "Unnamed: 0": "CVE-2008-3254", "mod_date": "2017-09-29", "pub_date": "2008-07-22", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in precms 1 allows remote attackers to execute arbitrary sql commands via the id parameter in a userprofil action.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in precms 1 allows remote attackers to execute arbitrary sql commands via the id parameter in a userprofil action.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-0026", "mod_date": "2018-10-12", "pub_date": "2016-11-10", "cvss": 9.3, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "the common log file system (clfs) driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allows local users to gain privileges via a crafted application, aka \"windows common log file system driver elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3332, cve-2016-3333, cve-2016-3334, cve-2016-3335, cve-2016-3338, cve-2016-3340, cve-2016-3342, cve-2016-3343, and cve-2016-7184.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: the common log file system (clfs) driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allows local users to gain privileges via a crafted application, aka \"windows common log file system driver elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3332, cve-2016-3333, cve-2016-3334, cve-2016-3335, cve-2016-3338, cve-2016-3340, cve-2016-3342, cve-2016-3343, and cve-2016-7184.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-10\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2017-14848", "mod_date": "2019-05-03", "pub_date": "2017-10-03", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "wphrm human resource management system for wordpress 1.0 allows sql injection via the employee_id parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: wphrm human resource management system for wordpress 1.0 allows sql injection via the employee_id parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-03\n- Last Modified Date: 2019-05-03" } ] }, { "Unnamed: 0": "CVE-2017-16850", "mod_date": "2018-08-28", "pub_date": "2017-11-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "zoho manageengine applications manager 13 before build 13530 allows sql injection via the /showresource.do resourceid parameter in a getresourceprofiles action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: zoho manageengine applications manager 13 before build 13530 allows sql injection via the /showresource.do resourceid parameter in a getresourceprofiles action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-11-16\n- Last Modified Date: 2018-08-28" } ] }, { "Unnamed: 0": "CVE-2008-5923", "mod_date": "2009-01-23", "pub_date": "2009-01-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in default.asp in asp-dev xm events diary allows remote attackers to execute arbitrary sql commands the cat parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in default.asp in asp-dev xm events diary allows remote attackers to execute arbitrary sql commands the cat parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-21\n- Last Modified Date: 2009-01-23" } ] }, { "Unnamed: 0": "CVE-2016-3221", "mod_date": "2018-10-12", "pub_date": "2016-06-16", "cvss": 6.9, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3218.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3218.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-06-16\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2010-4961", "mod_date": "2017-08-29", "pub_date": "2011-10-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the webkit pdfs (webkitpdf) extension before 1.1.4 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the webkit pdfs (webkitpdf) extension before 1.1.4 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-10-09\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2009-4883", "mod_date": "2017-09-19", "pub_date": "2010-06-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in phprecipebook 2.24 and 2.39 allows remote attackers to execute arbitrary sql commands via the (1) base_id or (2) course_id parameter in a search action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in phprecipebook 2.24 and 2.39 allows remote attackers to execute arbitrary sql commands via the (1) base_id or (2) course_id parameter in a search action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-06-11\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2017-4946", "mod_date": "2019-10-03", "pub_date": "2018-01-05", "cvss": 7.2, "cwe_code": 863, "cwe_name": " Incorrect Authorization", "summary": "the vmware v4h and v4pa desktop agents (6.x before 6.5.1) contain a privilege escalation vulnerability. successful exploitation of this issue could result in a low privileged windows user escalating their privileges to system.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Authorization." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 863:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Incorrect Authorization\n- Summary: the vmware v4h and v4pa desktop agents (6.x before 6.5.1) contain a privilege escalation vulnerability. successful exploitation of this issue could result in a low privileged windows user escalating their privileges to system.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-01-05\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2016-9416", "mod_date": "2017-02-05", "pub_date": "2017-01-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the users data handler in mybb (aka mybulletinboard) before 1.8.8 and mybb merge system before 1.8.8 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the users data handler in mybb (aka mybulletinboard) before 1.8.8 and mybb merge system before 1.8.8 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-01-31\n- Last Modified Date: 2017-02-05" } ] }, { "Unnamed: 0": "CVE-2018-8453", "mod_date": "2019-10-03", "pub_date": "2018-10-10", "cvss": 7.2, "cwe_code": 404, "cwe_name": " Improper Resource Shutdown or Release", "summary": "an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability.\" this affects windows 7, windows server 2012 r2, windows rt 8.1, windows server 2008, windows server 2019, windows server 2012, windows 8.1, windows server 2016, windows server 2008 r2, windows 10, windows 10 servers.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Resource Shutdown or Release." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 404:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Resource Shutdown or Release\n- Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability.\" this affects windows 7, windows server 2012 r2, windows rt 8.1, windows server 2008, windows server 2019, windows server 2012, windows 8.1, windows server 2016, windows server 2008 r2, windows 10, windows 10 servers.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-10-10\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2008-3748", "mod_date": "2017-09-29", "pub_date": "2008-08-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in view_group.php in active php bookmarks (apb) 1.1.02 and 1.2.06 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in view_group.php in active php bookmarks (apb) 1.1.02 and 1.2.06 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-08-21\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-4158", "mod_date": "2009-12-03", "pub_date": "2009-12-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the calendar base (cal) extension before 1.2.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the calendar base (cal) extension before 1.2.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-12-02\n- Last Modified Date: 2009-12-03" } ] }, { "Unnamed: 0": "CVE-2018-0917", "mod_date": "2019-10-03", "pub_date": "2018-03-14", "cvss": 6.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "microsoft sharepoint enterprise server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka \"microsoft sharepoint elevation of privilege vulnerability\". this cve is unique from cve-2018-0909, cve-2018-0910. cve-2018-0911, cve-2018-0912, cve-2018-0913 cve-2018-0914, cve-2018-0915, cve-2018-0916, cve-2018-0921, cve-2018-0923, cve-2018-0944 and cve-2018-0947.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: microsoft sharepoint enterprise server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka \"microsoft sharepoint elevation of privilege vulnerability\". this cve is unique from cve-2018-0909, cve-2018-0910. cve-2018-0911, cve-2018-0912, cve-2018-0913 cve-2018-0914, cve-2018-0915, cve-2018-0916, cve-2018-0921, cve-2018-0923, cve-2018-0944 and cve-2018-0947.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-03-14\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2010-3267", "mod_date": "2018-10-10", "pub_date": "2010-12-02", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in bugtracker.net before 3.4.5 allow remote authenticated users to execute arbitrary sql commands via (1) the qu_id parameter to bugs.aspx, (2) the row_id parameter to delete_query.aspx, the (3) new_project or (4) us_id parameter to edit_bug.aspx, or (5) the bug_list parameter to massedit.aspx. note: some of these details are obtained from third party information.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in bugtracker.net before 3.4.5 allow remote authenticated users to execute arbitrary sql commands via (1) the qu_id parameter to bugs.aspx, (2) the row_id parameter to delete_query.aspx, the (3) new_project or (4) us_id parameter to edit_bug.aspx, or (5) the bug_list parameter to massedit.aspx. note: some of these details are obtained from third party information.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-12-02\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2017-17920", "mod_date": "2018-01-10", "pub_date": "2017-12-29", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "** disputed ** sql injection vulnerability in the 'reorder' method in ruby on rails 5.1.4 and earlier allows remote attackers to execute arbitrary sql commands via the 'name' parameter. note: the vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ** disputed ** sql injection vulnerability in the 'reorder' method in ruby on rails 5.1.4 and earlier allows remote attackers to execute arbitrary sql commands via the 'name' parameter. note: the vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-29\n- Last Modified Date: 2018-01-10" } ] }, { "Unnamed: 0": "CVE-2012-1218", "mod_date": "2017-08-29", "pub_date": "2012-02-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in freelancerkit 2.35 allow remote attackers to execute arbitrary sql commands via unspecified vectors to the (1) notes and (2) tickets components.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in freelancerkit 2.35 allow remote attackers to execute arbitrary sql commands via unspecified vectors to the (1) notes and (2) tickets components.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-02-21\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2005-4071", "mod_date": "2017-07-20", "pub_date": "2005-12-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in cfmagic magic forum personal 2.5 and earlier allow remote attackers to execute arbitrary sql commands via the (1) forumid parameter in view_forum.cfm, and (2) forumid, (3) thread, and (4) threadid parameters in view_thread.cfm.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in cfmagic magic forum personal 2.5 and earlier allow remote attackers to execute arbitrary sql commands via the (1) forumid parameter in view_forum.cfm, and (2) forumid, (3) thread, and (4) threadid parameters in view_thread.cfm.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-12-08\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2017-15373", "mod_date": "2017-10-27", "pub_date": "2017-10-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "e-sic 1.0 allows sql injection via the q parameter to esiclivre/restrito/inc/lkpcep.php (aka the search private area).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: e-sic 1.0 allows sql injection via the q parameter to esiclivre/restrito/inc/lkpcep.php (aka the search private area).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-16\n- Last Modified Date: 2017-10-27" } ] }, { "Unnamed: 0": "CVE-2008-6378", "mod_date": "2017-09-29", "pub_date": "2009-03-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in calendar_eventupdate.asp in calendar mx professional 2.0.0 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in calendar_eventupdate.asp in calendar mx professional 2.0.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-02\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-0812", "mod_date": "2019-10-03", "pub_date": "2017-10-04", "cvss": 9.3, "cwe_code": 125, "cwe_name": " Out-of-bounds Read", "summary": "an elevation of privilege vulnerability in the android media framework (audio hal). product: android. versions: 7.0, 7.1.1, 7.1.2, 8.0. android id: a-62873231.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Out-of-bounds Read." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 125:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Out-of-bounds Read\n- Summary: an elevation of privilege vulnerability in the android media framework (audio hal). product: android. versions: 7.0, 7.1.1, 7.1.2, 8.0. android id: a-62873231.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-10-04\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2013-7096", "mod_date": "2018-12-10", "pub_date": "2013-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in sap emr unwired allow remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in sap emr unwired allow remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-12-13\n- Last Modified Date: 2018-12-10" } ] }, { "Unnamed: 0": "CVE-2018-5987", "mod_date": "2018-03-12", "pub_date": "2018-02-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the pinterest clone social pinboard 2.0 component for joomla! via the pin_id or user_id parameter in a task=getlikeinfo action, the ends parameter in a view=gift action, the category parameter in a view=home action, the uid parameter in a view=pindisplay action, the searchval parameter in a view=search action, or the uid parameter in a view=likes action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the pinterest clone social pinboard 2.0 component for joomla! via the pin_id or user_id parameter in a task=getlikeinfo action, the ends parameter in a view=gift action, the category parameter in a view=home action, the uid parameter in a view=pindisplay action, the searchval parameter in a view=search action, or the uid parameter in a view=likes action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-17\n- Last Modified Date: 2018-03-12" } ] }, { "Unnamed: 0": "CVE-2017-0554", "mod_date": "2019-10-03", "pub_date": "2017-04-07", "cvss": 6.8, "cwe_code": 862, "cwe_name": " Missing Authorization", "summary": "an elevation of privilege vulnerability in the telephony component could enable a local malicious application to access capabilities outside of its permission levels. this issue is rated as moderate because it could be used to gain access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-33815946.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Missing Authorization." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 862:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Missing Authorization\n- Summary: an elevation of privilege vulnerability in the telephony component could enable a local malicious application to access capabilities outside of its permission levels. this issue is rated as moderate because it could be used to gain access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-33815946.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-04-07\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2010-2131", "mod_date": "2013-08-22", "pub_date": "2010-06-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the calendar base (cal) extension before 1.3.2 for typo3 allows remote attackers to execute arbitrary sql commands via icalendar data.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the calendar base (cal) extension before 1.3.2 for typo3 allows remote attackers to execute arbitrary sql commands via icalendar data.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-06-02\n- Last Modified Date: 2013-08-22" } ] }, { "Unnamed: 0": "CVE-2014-9958", "mod_date": "2018-05-08", "pub_date": "2018-04-04", "cvss": 10.0, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in qualcomm closed source components. product: android. versions: android kernel. android id: a-36384774.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 10.0\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in qualcomm closed source components. product: android. versions: android kernel. android id: a-36384774.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-04-04\n- Last Modified Date: 2018-05-08" } ] }, { "Unnamed: 0": "CVE-2008-6379", "mod_date": "2017-09-29", "pub_date": "2009-03-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in pics_pre.asp in gallery mx 2.0.0 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in pics_pre.asp in gallery mx 2.0.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-02\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-0721", "mod_date": "2017-09-29", "pub_date": "2008-02-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the sermon (com_sermon) 0.2 component for mambo allows remote attackers to execute arbitrary sql commands via the gid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the sermon (com_sermon) 0.2 component for mambo allows remote attackers to execute arbitrary sql commands via the gid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-12\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-0130", "mod_date": "2017-08-08", "pub_date": "2008-01-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in login_form.asp in instant softwares dating site allows remote attackers to execute arbitrary sql commands via the username parameter, a different vulnerability than cve-2007-6671. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in login_form.asp in instant softwares dating site allows remote attackers to execute arbitrary sql commands via the username parameter, a different vulnerability than cve-2007-6671. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-08\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2019-13578", "mod_date": "2019-08-22", "pub_date": "2019-08-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability exists in the impress givewp give plugin through 2.5.0 for wordpress. successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary sql commands on the affected system via includes/payments/class-payments-query.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability exists in the impress givewp give plugin through 2.5.0 for wordpress. successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary sql commands on the affected system via includes/payments/class-payments-query.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-15\n- Last Modified Date: 2019-08-22" } ] }, { "Unnamed: 0": "CVE-2011-1667", "mod_date": "2017-08-17", "pub_date": "2011-04-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in anzeigenmarkt 2011 allows remote attackers to execute arbitrary sql commands via the q parameter in a list action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in anzeigenmarkt 2011 allows remote attackers to execute arbitrary sql commands via the q parameter in a list action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-04-10\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2018-11800", "mod_date": "2019-06-11", "pub_date": "2019-06-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in apache fineract before 1.3.0 allows attackers to execute arbitrary sql commands via a query on the groupsummarycounts related table.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in apache fineract before 1.3.0 allows attackers to execute arbitrary sql commands via a query on the groupsummarycounts related table.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-06-11\n- Last Modified Date: 2019-06-11" } ] }, { "Unnamed: 0": "CVE-2019-9759", "mod_date": "2019-04-02", "pub_date": "2019-04-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in tongda office anywhere 10.18.190121. there is a sql injection vulnerability via the general/approve_center/list/input_form/work_handle.php run_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in tongda office anywhere 10.18.190121. there is a sql injection vulnerability via the general/approve_center/list/input_form/work_handle.php run_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-04-02\n- Last Modified Date: 2019-04-02" } ] }, { "Unnamed: 0": "CVE-2009-3806", "mod_date": "2018-10-10", "pub_date": "2009-10-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in feedback_js.php in dedecms 5.1 allows remote attackers to execute arbitrary sql commands via the arcurl parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in feedback_js.php in dedecms 5.1 allows remote attackers to execute arbitrary sql commands via the arcurl parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-10-27\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2009-2339", "mod_date": "2017-09-19", "pub_date": "2009-07-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in rentventory allows remote attackers to execute arbitrary sql commands via the product parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in rentventory allows remote attackers to execute arbitrary sql commands via the product parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-07\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2019-1776", "mod_date": "2019-05-20", "pub_date": "2019-05-15", "cvss": 7.2, "cwe_code": 78, "cwe_name": " Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", "summary": "a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying linux operating system with a privilege level of root. the vulnerability is due to insufficient validation of arguments passed to a specific cli command on the affected device. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying linux operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 78:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\n- Summary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying linux operating system with a privilege level of root. the vulnerability is due to insufficient validation of arguments passed to a specific cli command on the affected device. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying linux operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-05-15\n- Last Modified Date: 2019-05-20" } ] }, { "Unnamed: 0": "CVE-2018-17412", "mod_date": "2019-03-08", "pub_date": "2019-03-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "zzcms v8.3 contains a sql injection vulnerability in /user/logincheck.php via an x-forwarded-for http header.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: zzcms v8.3 contains a sql injection vulnerability in /user/logincheck.php via an x-forwarded-for http header.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-03-07\n- Last Modified Date: 2019-03-08" } ] }, { "Unnamed: 0": "CVE-2010-2690", "mod_date": "2010-07-12", "pub_date": "2010-07-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the jooforge gamesbox (com_gamesbox) component 1.0.2, and possibly earlier, for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a consoles action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the jooforge gamesbox (com_gamesbox) component 1.0.2, and possibly earlier, for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a consoles action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-12\n- Last Modified Date: 2010-07-12" } ] }, { "Unnamed: 0": "CVE-2009-4727", "mod_date": "2017-09-19", "pub_date": "2010-03-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in x/login in junglescripts ajax short url script allows remote attackers to execute arbitrary sql commands via the username parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in x/login in junglescripts ajax short url script allows remote attackers to execute arbitrary sql commands via the username parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-18\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2015-2512", "mod_date": "2019-05-15", "pub_date": "2015-09-09", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the adobe type manager library in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 allows local users to gain privileges via a crafted application, aka \"font driver elevation of privilege vulnerability,\" a different vulnerability than cve-2015-2507.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the adobe type manager library in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 allows local users to gain privileges via a crafted application, aka \"font driver elevation of privilege vulnerability,\" a different vulnerability than cve-2015-2507.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-09-09\n- Last Modified Date: 2019-05-15" } ] }, { "Unnamed: 0": "CVE-2018-6662", "mod_date": "2019-10-09", "pub_date": "2018-06-05", "cvss": 7.2, "cwe_code": 78, "cwe_name": " Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", "summary": "privilege escalation vulnerability in mcafee management of native encryption (mne) before 4.1.4 allows local users to gain elevated privileges via a crafted user input.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 78:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\n- Summary: privilege escalation vulnerability in mcafee management of native encryption (mne) before 4.1.4 allows local users to gain elevated privileges via a crafted user input.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-06-05\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2007-4837", "mod_date": "2018-10-15", "pub_date": "2007-09-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in anket.asp in proxy anket 3.0.1 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in anket.asp in proxy anket 3.0.1 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-09-12\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2007-6163", "mod_date": "2018-10-15", "pub_date": "2007-11-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/index2.asp in gouae dwd realty allows remote attackers to execute arbitrary sql commands via the pword (aka password) parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/index2.asp in gouae dwd realty allows remote attackers to execute arbitrary sql commands via the pword (aka password) parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-11-29\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2008-6419", "mod_date": "2017-09-29", "pub_date": "2009-03-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in social site generator (ssg) 2.0 allow remote attackers to execute arbitrary sql commands via the (1) sgc_id parameter to display_blog.php, (2) scm_mem_id parameter to social_my_profile_download.php, and the (3) catid parameter to social_forum_subcategories.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in social site generator (ssg) 2.0 allow remote attackers to execute arbitrary sql commands via the (1) sgc_id parameter to display_blog.php, (2) scm_mem_id parameter to social_my_profile_download.php, and the (3) catid parameter to social_forum_subcategories.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-9167", "mod_date": "2017-04-05", "pub_date": "2017-03-23", "cvss": 5.0, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "ndsd in novell edirectory before 9.0.2 did not calculate acls on ldap objects across partition boundaries correctly, which could lead to a privilege escalation by modifying user attributes that would otherwise be filtered by an acl.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 5.0\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: ndsd in novell edirectory before 9.0.2 did not calculate acls on ldap objects across partition boundaries correctly, which could lead to a privilege escalation by modifying user attributes that would otherwise be filtered by an acl.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2017-03-23\n- Last Modified Date: 2017-04-05" } ] }, { "Unnamed: 0": "CVE-2018-6396", "mod_date": "2018-03-05", "pub_date": "2018-02-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the google map landkarten through 4.2.3 component for joomla! via the cid or id parameter in a layout=form_markers action, or the map parameter in a layout=default action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the google map landkarten through 4.2.3 component for joomla! via the cid or id parameter in a layout=form_markers action, or the map parameter in a layout=default action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-17\n- Last Modified Date: 2018-03-05" } ] }, { "Unnamed: 0": "CVE-2019-8342", "mod_date": "2019-05-14", "pub_date": "2019-05-13", "cvss": 4.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "a local privilege escalation in libqcocoa.dylib in foxit reader 3.1.0.0111 on macos has been discovered due to an incorrect permission set.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: a local privilege escalation in libqcocoa.dylib in foxit reader 3.1.0.0111 on macos has been discovered due to an incorrect permission set.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-05-13\n- Last Modified Date: 2019-05-14" } ] }, { "Unnamed: 0": "CVE-2019-7585", "mod_date": "2019-02-08", "pub_date": "2019-02-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in waimai super cms 20150505. web/lib/action/publicaction.class.php allows time-based sql injection via the param array parameter to the /index.php?m=public&a=checkemail uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in waimai super cms 20150505. web/lib/action/publicaction.class.php allows time-based sql injection via the param array parameter to the /index.php?m=public&a=checkemail uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-02-07\n- Last Modified Date: 2019-02-08" } ] }, { "Unnamed: 0": "CVE-2014-5399", "mod_date": "2015-11-02", "pub_date": "2014-08-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in schneider electric wonderware information server (wis) portal 4.0 sp1 through 5.5 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in schneider electric wonderware information server (wis) portal 4.0 sp1 through 5.5 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-08-28\n- Last Modified Date: 2015-11-02" } ] }, { "Unnamed: 0": "CVE-2011-4215", "mod_date": "2012-01-27", "pub_date": "2011-11-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in lib/ooz_access.php in oneorzero action & information management system (aims) 2.7.0 allows remote attackers to execute arbitrary sql commands via the cookiename variable.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in lib/ooz_access.php in oneorzero action & information management system (aims) 2.7.0 allows remote attackers to execute arbitrary sql commands via the cookiename variable.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-01\n- Last Modified Date: 2012-01-27" } ] }, { "Unnamed: 0": "CVE-2019-12570", "mod_date": "2019-07-05", "pub_date": "2019-07-03", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability in the xpert solution \"server status by hostname/ip\" plugin 4.6 for wordpress allows an authenticated user to execute arbitrary sql commands via get parameters.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability in the xpert solution \"server status by hostname/ip\" plugin 4.6 for wordpress allows an authenticated user to execute arbitrary sql commands via get parameters.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-07-03\n- Last Modified Date: 2019-07-05" } ] }, { "Unnamed: 0": "CVE-2010-4870", "mod_date": "2018-10-10", "pub_date": "2011-10-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in bloofoxcms 0.3.5 allows remote attackers to execute arbitrary sql commands via the gender parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in bloofoxcms 0.3.5 allows remote attackers to execute arbitrary sql commands via the gender parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-10-07\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2014-0318", "mod_date": "2019-05-15", "pub_date": "2014-08-12", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "win32k.sys in the kernel-mode drivers in microsoft windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 does not properly control access to thread-owned objects, which allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: win32k.sys in the kernel-mode drivers in microsoft windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 does not properly control access to thread-owned objects, which allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2014-08-12\n- Last Modified Date: 2019-05-15" } ] }, { "Unnamed: 0": "CVE-2017-16716", "mod_date": "2018-02-02", "pub_date": "2018-01-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection issue was discovered in webaccess versions prior to 8.3. webaccess does not properly sanitize its inputs for sql commands.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection issue was discovered in webaccess versions prior to 8.3. webaccess does not properly sanitize its inputs for sql commands.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-05\n- Last Modified Date: 2018-02-02" } ] }, { "Unnamed: 0": "CVE-2008-1791", "mod_date": "2017-09-29", "pub_date": "2008-04-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ladder.php in my gaming ladder 7.5 and earlier allows remote attackers to execute arbitrary sql commands via the ladderid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ladder.php in my gaming ladder 7.5 and earlier allows remote attackers to execute arbitrary sql commands via the ladderid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-15\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-5575", "mod_date": "2017-01-26", "pub_date": "2017-01-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in inc/lib/options.class.php in genixcms before 1.0.0 allows remote attackers to execute arbitrary sql commands via the modules parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in inc/lib/options.class.php in genixcms before 1.0.0 allows remote attackers to execute arbitrary sql commands via the modules parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-01-23\n- Last Modified Date: 2017-01-26" } ] }, { "Unnamed: 0": "CVE-2008-7003", "mod_date": "2017-09-29", "pub_date": "2009-08-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in login.php in the rat cms alpha 2 allow remote attackers to execute arbitrary sql commands via the (1) user_id and (2) password parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in login.php in the rat cms alpha 2 allow remote attackers to execute arbitrary sql commands via the (1) user_id and (2) password parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-08-19\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-17603", "mod_date": "2017-12-22", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "advanced real estate script 4.0.7 has sql injection via the search-results.php projectmain, proj_type, searchtext, sell_price, or maxprice parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: advanced real estate script 4.0.7 has sql injection via the search-results.php projectmain, proj_type, searchtext, sell_price, or maxprice parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-22" } ] }, { "Unnamed: 0": "CVE-2017-1301", "mod_date": "2017-10-25", "pub_date": "2017-10-05", "cvss": 3.6, "cwe_code": 59, "cwe_name": " Improper Link Resolution Before File Access ('Link Following')", "summary": "ibm spectrum protect 7.1 and 8.1 could allow a local attacker to launch a symlink attack. ibm spectrum protect backup-archive client creates temporary files insecurely. a local attacker could exploit this vulnerability by creating a symbolic link from a temporary file to various files on the system, which could allow the attacker to overwrite arbitrary files on the system with elevated privileges. ibm x-force id: 125163.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Link Resolution Before File Access ('Link Following')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 59:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.6\n- CWE Name: Improper Link Resolution Before File Access ('Link Following')\n- Summary: ibm spectrum protect 7.1 and 8.1 could allow a local attacker to launch a symlink attack. ibm spectrum protect backup-archive client creates temporary files insecurely. a local attacker could exploit this vulnerability by creating a symbolic link from a temporary file to various files on the system, which could allow the attacker to overwrite arbitrary files on the system with elevated privileges. ibm x-force id: 125163.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/PARTIAL\n- Published Date: 2017-10-05\n- Last Modified Date: 2017-10-25" } ] }, { "Unnamed: 0": "CVE-2012-3834", "mod_date": "2017-08-29", "pub_date": "2012-07-03", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in forensics/base_qry_main.php in alienvault open source security information management (ossim) 3.1 allows remote authenticated users to execute arbitrary sql commands via the time[0][0] parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in forensics/base_qry_main.php in alienvault open source security information management (ossim) 3.1 allows remote authenticated users to execute arbitrary sql commands via the time[0][0] parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-07-03\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-3673", "mod_date": "2017-09-29", "pub_date": "2008-08-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in browsecats.php in pozscripts classified ads allows remote attackers to execute arbitrary sql commands via the cid parameter, a different vector than cve-2008-3672.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in browsecats.php in pozscripts classified ads allows remote attackers to execute arbitrary sql commands via the cid parameter, a different vector than cve-2008-3672.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-08-13\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2011-0644", "mod_date": "2017-08-17", "pub_date": "2011-01-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in include/admin/model_field.class.php in phpcms 2008 v2 allows remote attackers to execute arbitrary sql commands via the modelid parameter to flash_upload.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in include/admin/model_field.class.php in phpcms 2008 v2 allows remote attackers to execute arbitrary sql commands via the modelid parameter to flash_upload.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-01-25\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2011-4803", "mod_date": "2012-03-05", "pub_date": "2011-12-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in wptouch/ajax.php in the wptouch plugin for wordpress allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in wptouch/ajax.php in the wptouch plugin for wordpress allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-12-14\n- Last Modified Date: 2012-03-05" } ] }, { "Unnamed: 0": "CVE-2015-1875", "mod_date": "2016-08-04", "pub_date": "2015-03-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in a2billing/customer/iridium_threed.php in elastix 2.5.0 and earlier allows remote attackers to execute arbitrary sql commands via the transactionid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in a2billing/customer/iridium_threed.php in elastix 2.5.0 and earlier allows remote attackers to execute arbitrary sql commands via the transactionid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-03-11\n- Last Modified Date: 2016-08-04" } ] }, { "Unnamed: 0": "CVE-2007-6058", "mod_date": "2018-10-15", "pub_date": "2007-11-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in index.php in profilecms 1.0 and earlier allow remote attackers to execute arbitrary sql commands via the id parameter in a (1) codes action in the profile-codes module, (2) videos action in the video-codes module, or (3) games action in the arcade-games module.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in index.php in profilecms 1.0 and earlier allow remote attackers to execute arbitrary sql commands via the id parameter in a (1) codes action in the profile-codes module, (2) videos action in the video-codes module, or (3) games action in the arcade-games module.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-11-20\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2016-6718", "mod_date": "2016-12-06", "pub_date": "2016-11-25", "cvss": 4.3, "cwe_code": 200, "cwe_name": " Information Exposure", "summary": "an elevation of privilege vulnerability in the account manager service in android 7.0 before 2016-11-01 could enable a local malicious application to retrieve sensitive information without user interaction. this issue is rated as moderate because it is a local bypass of user interaction requirements (access to functionality that would normally require either user initiation or user permission.) android id: a-30455516.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Information Exposure." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 200:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.3\n- CWE Name: Information Exposure\n- Summary: an elevation of privilege vulnerability in the account manager service in android 7.0 before 2016-11-01 could enable a local malicious application to retrieve sensitive information without user interaction. this issue is rated as moderate because it is a local bypass of user interaction requirements (access to functionality that would normally require either user initiation or user permission.) android id: a-30455516.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2016-11-25\n- Last Modified Date: 2016-12-06" } ] }, { "Unnamed: 0": "CVE-2008-3649", "mod_date": "2017-09-29", "pub_date": "2008-08-13", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in categorydetail.php in article friendly standard allows remote attackers to execute arbitrary sql commands via the cat parameter. regarding access complexity:\r\n\r\nhttp://secunia.com/advisories/31292:\r\n\r\n\"input passed to the \"autid\" parameter in authordetail.php and to the \"cat\" parameter in categorydetail.php is not properly sanitised before being used in sql queries. this can be exploited to manipulate sql queries by injecting arbitrary sql code.\r\n\r\nsuccessful exploitation requires that \"magic_quotes_gpc\" is disabled.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in categorydetail.php in article friendly standard allows remote attackers to execute arbitrary sql commands via the cat parameter. regarding access complexity:\r\n\r\nhttp://secunia.com/advisories/31292:\r\n\r\n\"input passed to the \"autid\" parameter in authordetail.php and to the \"cat\" parameter in categorydetail.php is not properly sanitised before being used in sql queries. this can be exploited to manipulate sql queries by injecting arbitrary sql code.\r\n\r\nsuccessful exploitation requires that \"magic_quotes_gpc\" is disabled.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-08-13\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-9272", "mod_date": "2016-11-29", "pub_date": "2016-11-11", "cvss": 6.4, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a blind sql injection vulnerability in exponent cms through 2.4.0, with the rerank array parameter, can lead to site database information disclosure and denial of service.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.4\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a blind sql injection vulnerability in exponent cms through 2.4.0, with the rerank array parameter, can lead to site database information disclosure and denial of service.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/PARTIAL\n- Published Date: 2016-11-11\n- Last Modified Date: 2016-11-29" } ] }, { "Unnamed: 0": "CVE-2015-9454", "mod_date": "2019-10-10", "pub_date": "2019-10-07", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the smooth-slider plugin before 2.7 for wordpress has sql injection via the wp-admin/admin.php?page=smooth-slider-admin current_slider_id parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the smooth-slider plugin before 2.7 for wordpress has sql injection via the wp-admin/admin.php?page=smooth-slider-admin current_slider_id parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-07\n- Last Modified Date: 2019-10-10" } ] }, { "Unnamed: 0": "CVE-2018-1083", "mod_date": "2019-10-09", "pub_date": "2018-03-28", "cvss": 7.2, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. a local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. if the user affected is privileged, this leads to privilege escalation.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. a local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. if the user affected is privileged, this leads to privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-03-28\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2018-18804", "mod_date": "2018-12-17", "pub_date": "2018-11-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "bakeshop inventory system 1.0 has sql injection via the login screen, related to include/publicfunction.vb.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: bakeshop inventory system 1.0 has sql injection via the login screen, related to include/publicfunction.vb.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-11-16\n- Last Modified Date: 2018-12-17" } ] }, { "Unnamed: 0": "CVE-2017-8181", "mod_date": "2017-12-08", "pub_date": "2017-11-22", "cvss": 6.8, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "the camera driver of mtk platform in huawei smart phones with software of versions earlier than nice-al00c00b155 has a arbitrary memory write vulnerability.due to the insufficient input verification, an attacker tricks a user into installing a malicious application which has special privilege and sends a specific parameter to the driver of the smart phone, causing privilege escalation.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: the camera driver of mtk platform in huawei smart phones with software of versions earlier than nice-al00c00b155 has a arbitrary memory write vulnerability.due to the insufficient input verification, an attacker tricks a user into installing a malicious application which has special privilege and sends a specific parameter to the driver of the smart phone, causing privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-11-22\n- Last Modified Date: 2017-12-08" } ] }, { "Unnamed: 0": "CVE-2017-6577", "mod_date": "2019-03-19", "pub_date": "2017-03-09", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection issue is exploitable, with wordpress admin access, in the mail masta (aka mail-masta) plugin 1.0 for wordpress. this affects ./inc/subscriber_list.php with the post parameter: list_id.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection issue is exploitable, with wordpress admin access, in the mail masta (aka mail-masta) plugin 1.0 for wordpress. this affects ./inc/subscriber_list.php with the post parameter: list_id.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-03-09\n- Last Modified Date: 2019-03-19" } ] }, { "Unnamed: 0": "CVE-2017-14738", "mod_date": "2017-10-10", "pub_date": "2017-09-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "filerun (version 2017.09.18 and below) suffers from a remote sql injection vulnerability due to a failure to sanitize input in the metafield parameter inside the metasearch module (under the search function).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: filerun (version 2017.09.18 and below) suffers from a remote sql injection vulnerability due to a failure to sanitize input in the metafield parameter inside the metasearch module (under the search function).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-09-30\n- Last Modified Date: 2017-10-10" } ] }, { "Unnamed: 0": "CVE-2008-5268", "mod_date": "2018-10-11", "pub_date": "2008-11-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in content/forums/reply.asp in aspportal allows remote attackers to execute arbitrary sql commands via the topic_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in content/forums/reply.asp in aspportal allows remote attackers to execute arbitrary sql commands via the topic_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-28\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2018-5978", "mod_date": "2018-02-07", "pub_date": "2018-01-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in facebook style php ajax chat zechat 1.5 via the login.php user field.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in facebook style php ajax chat zechat 1.5 via the login.php user field.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-24\n- Last Modified Date: 2018-02-07" } ] }, { "Unnamed: 0": "CVE-2019-1000", "mod_date": "2019-10-10", "pub_date": "2019-05-16", "cvss": 3.5, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists in microsoft azure active directory connect build 1.3.20.0, which allows an attacker to execute two powershell cmdlets in context of a privileged account, and perform privileged actions.to exploit this, an attacker would need to authenticate to the azure\u00e2? ad connect server, aka 'microsoft azure ad connect elevation of privilege vulnerability'.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.5\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists in microsoft azure active directory connect build 1.3.20.0, which allows an attacker to execute two powershell cmdlets in context of a privileged account, and perform privileged actions.to exploit this, an attacker would need to authenticate to the azure\u00e2? ad connect server, aka 'microsoft azure ad connect elevation of privilege vulnerability'.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2019-05-16\n- Last Modified Date: 2019-10-10" } ] }, { "Unnamed: 0": "CVE-2013-5931", "mod_date": "2013-10-15", "pub_date": "2013-09-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in property_listings_detail.php in real estate php script allows remote attackers to execute arbitrary sql commands via the listingid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in property_listings_detail.php in real estate php script allows remote attackers to execute arbitrary sql commands via the listingid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-09-23\n- Last Modified Date: 2013-10-15" } ] }, { "Unnamed: 0": "CVE-2017-15566", "mod_date": "2019-10-03", "pub_date": "2017-11-01", "cvss": 7.2, "cwe_code": 426, "cwe_name": " Untrusted Search Path", "summary": "insecure spank environment variable handling exists in schedmd slurm before 16.05.11, 17.x before 17.02.9, and 17.11.x before 17.11.0rc2, allowing privilege escalation to root during prolog or epilog execution.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Untrusted Search Path." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 426:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Untrusted Search Path\n- Summary: insecure spank environment variable handling exists in schedmd slurm before 16.05.11, 17.x before 17.02.9, and 17.11.x before 17.11.0rc2, allowing privilege escalation to root during prolog or epilog execution.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-11-01\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2007-4846", "mod_date": "2017-09-29", "pub_date": "2007-09-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in start.php in webace-linkscript (wls) 1.3 special edition (se) allows remote attackers to execute arbitrary sql commands via the id parameter in a rubrik go action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in start.php in webace-linkscript (wls) 1.3 special edition (se) allows remote attackers to execute arbitrary sql commands via the id parameter in a rubrik go action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-09-12\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2014-2780", "mod_date": "2019-05-15", "pub_date": "2014-07-08", "cvss": 6.9, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "directshow in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, and windows server 2012 gold and r2 allows local users to gain privileges by leveraging control over a low-integrity process to execute a crafted application, aka \"directshow elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: directshow in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, and windows server 2012 gold and r2 allows local users to gain privileges by leveraging control over a low-integrity process to execute a crafted application, aka \"directshow elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2014-07-08\n- Last Modified Date: 2019-05-15" } ] }, { "Unnamed: 0": "CVE-2012-1067", "mod_date": "2017-08-29", "pub_date": "2012-02-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the wp-recentcomments plugin 2.0.7 for wordpress allows remote attackers to execute arbitrary sql commands via the id parameter in an rc-content action to index.php. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the wp-recentcomments plugin 2.0.7 for wordpress allows remote attackers to execute arbitrary sql commands via the id parameter in an rc-content action to index.php. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-02-14\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-2416", "mod_date": "2017-09-29", "pub_date": "2008-05-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in fichive 1.0 allows remote attackers to execute arbitrary sql commands via the category parameter in a fiction action, possibly related to sources/fiction.class.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in fichive 1.0 allows remote attackers to execute arbitrary sql commands via the category parameter in a fiction action, possibly related to sources/fiction.class.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-6332", "mod_date": "2017-09-29", "pub_date": "2009-02-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in login.php in simple customer 1.2 allows remote attackers to execute arbitrary sql commands via the password parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in login.php in simple customer 1.2 allows remote attackers to execute arbitrary sql commands via the password parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-27\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-18619", "mod_date": "2018-12-28", "pub_date": "2018-11-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "internal/advanced_comment_system/admin.php in advanced comment system 1.0 is prone to an sql injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an sql query, allowing remote attackers to execute the sqli attack via a url in the \"page\" parameter. note: the product is discontinued.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: internal/advanced_comment_system/admin.php in advanced comment system 1.0 is prone to an sql injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an sql query, allowing remote attackers to execute the sqli attack via a url in the \"page\" parameter. note: the product is discontinued.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-11-29\n- Last Modified Date: 2018-12-28" } ] }, { "Unnamed: 0": "CVE-2017-8559", "mod_date": "2017-07-14", "pub_date": "2017-07-11", "cvss": 4.3, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "microsoft exchange server 2010 sp3, exchange server 2013 sp3, exchange server 2013 cu16, and exchange server 2016 cu5 allows an elevation of privilege vulnerability due to the way that exchange outlook web access (owa) handles web requests, aka \"microsoft exchange cross-site scripting vulnerability\". this cve id is unique from cve-2017-8560.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.3\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: microsoft exchange server 2010 sp3, exchange server 2013 sp3, exchange server 2013 cu16, and exchange server 2016 cu5 allows an elevation of privilege vulnerability due to the way that exchange outlook web access (owa) handles web requests, aka \"microsoft exchange cross-site scripting vulnerability\". this cve id is unique from cve-2017-8560.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2017-07-11\n- Last Modified Date: 2017-07-14" } ] }, { "Unnamed: 0": "CVE-2018-17575", "mod_date": "2018-11-21", "pub_date": "2018-09-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "swa swa.jacad 3.1.37 build 024 has sql injection via the /academico/aluno/esqueci-minha-senha/ studentid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: swa swa.jacad 3.1.37 build 024 has sql injection via the /academico/aluno/esqueci-minha-senha/ studentid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-09-28\n- Last Modified Date: 2018-11-21" } ] }, { "Unnamed: 0": "CVE-2019-4422", "mod_date": "2019-10-09", "pub_date": "2019-10-03", "cvss": 6.5, "cwe_code": 287, "cwe_name": " Improper Authentication", "summary": "ibm security guardium 9.0, 9.5, and 10.6 are vulnerable to a privilege escalation which could allow an authenticated user to change the accessmgr password. ibm x-force id: 162768.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Authentication." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 287:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Authentication\n- Summary: ibm security guardium 9.0, 9.5, and 10.6 are vulnerable to a privilege escalation which could allow an authenticated user to change the accessmgr password. ibm x-force id: 162768.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-03\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2010-5019", "mod_date": "2011-11-17", "pub_date": "2011-11-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in view_photo.php in 2daybiz online classified script allows remote attackers to execute arbitrary sql commands via the alb parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in view_photo.php in 2daybiz online classified script allows remote attackers to execute arbitrary sql commands via the alb parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-02\n- Last Modified Date: 2011-11-17" } ] }, { "Unnamed: 0": "CVE-2008-0734", "mod_date": "2017-09-29", "pub_date": "2008-02-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in class_auth.php in limbo cms 1.0.4.2, and possibly earlier versions, allows remote attackers to execute arbitrary sql commands via the cuid cookie parameter to admin.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in class_auth.php in limbo cms 1.0.4.2, and possibly earlier versions, allows remote attackers to execute arbitrary sql commands via the cuid cookie parameter to admin.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-13\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-5637", "mod_date": "2017-09-29", "pub_date": "2008-12-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in blog.asp in parsblogger (pb) allows remote attackers to execute arbitrary sql commands via the wr parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in blog.asp in parsblogger (pb) allows remote attackers to execute arbitrary sql commands via the wr parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-6762", "mod_date": "2017-01-19", "pub_date": "2017-01-12", "cvss": 6.8, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the libziparchive library could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. android id: a-31251826.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the libziparchive library could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. android id: a-31251826.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-01-12\n- Last Modified Date: 2017-01-19" } ] }, { "Unnamed: 0": "CVE-2007-5998", "mod_date": "2017-09-29", "pub_date": "2007-11-15", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ads.php in softbiz ad management plus script 1 allows remote authenticated users to execute arbitrary sql commands via the package parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ads.php in softbiz ad management plus script 1 allows remote authenticated users to execute arbitrary sql commands via the package parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-11-15\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-4891", "mod_date": "2012-05-14", "pub_date": "2011-10-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the yet another calendar (ke_yac) extension before 1.1.2 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the yet another calendar (ke_yac) extension before 1.1.2 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-10-07\n- Last Modified Date: 2012-05-14" } ] }, { "Unnamed: 0": "CVE-2008-6324", "mod_date": "2017-09-29", "pub_date": "2009-02-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in forummessages.cfm in cf_forum allows remote attackers to execute arbitrary sql commands via the categorynbr parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in forummessages.cfm in cf_forum allows remote attackers to execute arbitrary sql commands via the categorynbr parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-27\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-3937", "mod_date": "2017-09-29", "pub_date": "2007-07-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in a-shop 0.70 and earlier allow remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in a-shop 0.70 and earlier allow remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-07-21\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-5120", "mod_date": "2019-10-30", "pub_date": "2019-10-25", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an exploitable sql injection vulnerability exists in the authenticated part of youphptube 7.6. specially crafted web requests can cause sql injections. an attacker can send a web request with parameters containing sql injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an exploitable sql injection vulnerability exists in the authenticated part of youphptube 7.6. specially crafted web requests can cause sql injections. an attacker can send a web request with parameters containing sql injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-25\n- Last Modified Date: 2019-10-30" } ] }, { "Unnamed: 0": "CVE-2009-2554", "mod_date": "2017-09-19", "pub_date": "2009-07-20", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the search method in jobline.class.php in jobline (com_jobline) 1.1.2.2, 1.3.1, and possibly earlier versions, a component for joomla!, allows remote attackers to execute arbitrary sql commands via the search parameter in a results action to index.php, which invokes the search method from the searchjobpostings function in jobline.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the search method in jobline.class.php in jobline (com_jobline) 1.1.2.2, 1.3.1, and possibly earlier versions, a component for joomla!, allows remote attackers to execute arbitrary sql commands via the search parameter in a results action to index.php, which invokes the search method from the searchjobpostings function in jobline.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-20\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2010-2255", "mod_date": "2010-06-10", "pub_date": "2010-06-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the bf survey pro (com_bfsurvey_pro) component before 1.3.1, bf survey pro free (com_bfsurvey_profree) component 1.2.6, and bf survey basic component before 1.2 for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter to index.php. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the bf survey pro (com_bfsurvey_pro) component before 1.3.1, bf survey pro free (com_bfsurvey_profree) component 1.2.6, and bf survey basic component before 1.2 for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter to index.php. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-06-09\n- Last Modified Date: 2010-06-10" } ] }, { "Unnamed: 0": "CVE-2009-3310", "mod_date": "2017-09-19", "pub_date": "2009-09-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in zainu 1.0 allows remote attackers to execute arbitrary sql commands via the album_id parameter in an albumsongs action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in zainu 1.0 allows remote attackers to execute arbitrary sql commands via the album_id parameter in an albumsongs action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-23\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-3258", "mod_date": "2017-08-08", "pub_date": "2008-07-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in zoph before 0.7.0.5 allow remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in zoph before 0.7.0.5 allow remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-22\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2009-1863", "mod_date": "2017-09-29", "pub_date": "2009-07-31", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "unspecified vulnerability in adobe flash player before 9.0.246.0 and 10.x before 10.0.32.18, and adobe air before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to a \"privilege escalation vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: unspecified vulnerability in adobe flash player before 9.0.246.0 and 10.x before 10.0.32.18, and adobe air before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to a \"privilege escalation vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2009-07-31\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-1094", "mod_date": "2017-08-17", "pub_date": "2010-03-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in news.php in dz erotik auktionshaus v4rgo allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in news.php in dz erotik auktionshaus v4rgo allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-24\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2015-4628", "mod_date": "2016-12-07", "pub_date": "2015-06-18", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in application/controllers/admin/questiongroups.php in limesurvey before 2.06+ build 150618 allows remote authenticated administrators to execute arbitrary sql commands via the sid parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in application/controllers/admin/questiongroups.php in limesurvey before 2.06+ build 150618 allows remote authenticated administrators to execute arbitrary sql commands via the sid parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-06-18\n- Last Modified Date: 2016-12-07" } ] }, { "Unnamed: 0": "CVE-2019-15246", "mod_date": "2019-10-18", "pub_date": "2019-10-16", "cvss": 5.2, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "multiple vulnerabilities in cisco spa100 series analog telephone adapters (atas) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. the vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. an attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. a successful exploit could allow the attacker to execute arbitrary code with elevated privileges. note: the web-based management interface is enabled by default.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "ADJACENT_NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 5.2\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: multiple vulnerabilities in cisco spa100 series analog telephone adapters (atas) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. the vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. an attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. a successful exploit could allow the attacker to execute arbitrary code with elevated privileges. note: the web-based management interface is enabled by default.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: ADJACENT_NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-16\n- Last Modified Date: 2019-10-18" } ] }, { "Unnamed: 0": "CVE-2011-5112", "mod_date": "2012-08-24", "pub_date": "2012-08-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in alameda (com_alameda) component before 1.0.1 for joomla! allows remote attackers to execute arbitrary sql commands via the storeid parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in alameda (com_alameda) component before 1.0.1 for joomla! allows remote attackers to execute arbitrary sql commands via the storeid parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-08-23\n- Last Modified Date: 2012-08-24" } ] }, { "Unnamed: 0": "CVE-2010-2910", "mod_date": "2017-08-17", "pub_date": "2010-07-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the ozio gallery (com_oziogallery) component for joomla! allows remote attackers to execute arbitrary sql commands via the itemid parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the ozio gallery (com_oziogallery) component for joomla! allows remote attackers to execute arbitrary sql commands via the itemid parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-28\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2008-3772", "mod_date": "2017-09-29", "pub_date": "2008-08-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in categories_portal.php in pars4u videosharing 1 allows remote attackers to execute arbitrary sql commands via the cat_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in categories_portal.php in pars4u videosharing 1 allows remote attackers to execute arbitrary sql commands via the cat_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-08-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-6254", "mod_date": "2017-09-29", "pub_date": "2009-02-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in scripts/documents.php in jadu galaxies allows remote attackers to execute arbitrary sql commands via the categoryid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in scripts/documents.php in jadu galaxies allows remote attackers to execute arbitrary sql commands via the categoryid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2014-9345", "mod_date": "2014-12-09", "pub_date": "2014-12-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in guruperl.net advertise with pleasure! professional (aka awp pro) 6.6 and earlier allows remote attackers to execute arbitrary sql commands via the group_id parameter in a list_zone action to cgi/client.cgi.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in guruperl.net advertise with pleasure! professional (aka awp pro) 6.6 and earlier allows remote attackers to execute arbitrary sql commands via the group_id parameter in a list_zone action to cgi/client.cgi.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-12-08\n- Last Modified Date: 2014-12-09" } ] }, { "Unnamed: 0": "CVE-2008-3245", "mod_date": "2017-09-29", "pub_date": "2008-07-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in phphoo3.php in phphoo3 4.3.9, 4.3.10, 4.4.8, and 5.2.6 allows remote attackers to execute arbitrary sql commands via the viewcat parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in phphoo3.php in phphoo3 4.3.9, 4.3.10, 4.4.8, and 5.2.6 allows remote attackers to execute arbitrary sql commands via the viewcat parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-21\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-4901", "mod_date": "2017-10-19", "pub_date": "2008-11-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/admin.php in article publisher pro 1.5 allows remote attackers to execute arbitrary sql commands via the username parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/admin.php in article publisher pro 1.5 allows remote attackers to execute arbitrary sql commands via the username parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-04\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2011-4710", "mod_date": "2012-01-03", "pub_date": "2011-12-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in pixie cms 1.01 through 1.04 allow remote attackers to execute arbitrary sql commands via the (1) pixie_user parameter and (2) referer http header in a request to the default uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in pixie cms 1.01 through 1.04 allow remote attackers to execute arbitrary sql commands via the (1) pixie_user parameter and (2) referer http header in a request to the default uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-12-08\n- Last Modified Date: 2012-01-03" } ] }, { "Unnamed: 0": "CVE-2008-2700", "mod_date": "2017-09-29", "pub_date": "2008-06-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in view.php in galatolo webmanager 1.0 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in view.php in galatolo webmanager 1.0 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-13\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-3330", "mod_date": "2017-09-19", "pub_date": "2009-09-23", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in cp creator 2.7.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the tickets parameter in a support ticket action.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in cp creator 2.7.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the tickets parameter in a support ticket action.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-23\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2007-1171", "mod_date": "2018-10-16", "pub_date": "2007-03-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in includes/nsbypass.php in nukesentinel 2.5.05, 2.5.11, and other versions before 2.5.12 allows remote attackers to execute arbitrary sql commands via an admin cookie.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in includes/nsbypass.php in nukesentinel 2.5.05, 2.5.11, and other versions before 2.5.12 allows remote attackers to execute arbitrary sql commands via an admin cookie.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-03-02\n- Last Modified Date: 2018-10-16" } ] }, { "Unnamed: 0": "CVE-2019-1604", "mod_date": "2019-10-09", "pub_date": "2019-03-08", "cvss": 7.2, "cwe_code": 285, "cwe_name": " Improper Authorization", "summary": "a vulnerability in the user account management interface of cisco nx-os software could allow an authenticated, local attacker to gain elevated privileges on an affected device. the vulnerability is due to an incorrect authorization check of user accounts and their associated group id (gid). an attacker could exploit this vulnerability by taking advantage of a logic error that will permit the use of higher privileged commands than what is necessarily assigned. a successful exploit could allow an attacker to execute commands with elevated privileges on the underlying linux shell of an affected device. nexus 7000 and 7700 series switches are affected in versions prior to 6.2(22), 8.2(3), and 8.3(2). nexus 3000 series switches are affected in versions prior to 7.0(3)i7(4). nexus 3500 platform switches are affected in versions prior to 7.0(3)i7(4). nexus 3600 platform switches are affected in versions prior to 7.0(3)f3(5). nexus 9000 series switches-standalone are affected in versions prior to 7.0(3)i7(4). nexus 9500 r-series line cards and fabric modules are affected in versions prior to 7.0(3)f3(5).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Authorization." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 285:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Authorization\n- Summary: a vulnerability in the user account management interface of cisco nx-os software could allow an authenticated, local attacker to gain elevated privileges on an affected device. the vulnerability is due to an incorrect authorization check of user accounts and their associated group id (gid). an attacker could exploit this vulnerability by taking advantage of a logic error that will permit the use of higher privileged commands than what is necessarily assigned. a successful exploit could allow an attacker to execute commands with elevated privileges on the underlying linux shell of an affected device. nexus 7000 and 7700 series switches are affected in versions prior to 6.2(22), 8.2(3), and 8.3(2). nexus 3000 series switches are affected in versions prior to 7.0(3)i7(4). nexus 3500 platform switches are affected in versions prior to 7.0(3)i7(4). nexus 3600 platform switches are affected in versions prior to 7.0(3)f3(5). nexus 9000 series switches-standalone are affected in versions prior to 7.0(3)i7(4). nexus 9500 r-series line cards and fabric modules are affected in versions prior to 7.0(3)f3(5).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-03-08\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2017-8187", "mod_date": "2019-10-03", "pub_date": "2018-03-20", "cvss": 6.5, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "huawei fusionsphere openstack v100r006c00spc102(nfv) has a privilege escalation vulnerability. due to improper privilege restrictions, an attacker with high privilege may obtain the other users' certificates. successful exploit may cause privilege escalation.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Privilege Management\n- Summary: huawei fusionsphere openstack v100r006c00spc102(nfv) has a privilege escalation vulnerability. due to improper privilege restrictions, an attacker with high privilege may obtain the other users' certificates. successful exploit may cause privilege escalation.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-03-20\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2015-2035", "mod_date": "2016-11-30", "pub_date": "2015-02-20", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the administrative backend in piwigo before 2.7.4 allows remote administrators to execute arbitrary sql commands via the user parameter in the history page to admin.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the administrative backend in piwigo before 2.7.4 allows remote administrators to execute arbitrary sql commands via the user parameter in the history page to admin.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-02-20\n- Last Modified Date: 2016-11-30" } ] }, { "Unnamed: 0": "CVE-2009-3205", "mod_date": "2017-08-17", "pub_date": "2009-09-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in main.php in cbauthority allows remote attackers to execute arbitrary sql commands via the id parameter in a view_product action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in main.php in cbauthority allows remote attackers to execute arbitrary sql commands via the id parameter in a view_product action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-16\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2017-12653", "mod_date": "2019-10-03", "pub_date": "2017-08-07", "cvss": 6.8, "cwe_code": 427, "cwe_name": " Uncontrolled Search Path Element", "summary": "360 total security 9.0.0.1202 before 2017-07-07 allows privilege escalation via a trojan horse shcore.dll file in any directory in the path, as demonstrated by the c:\\python27 directory.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Uncontrolled Search Path Element." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 427:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Uncontrolled Search Path Element\n- Summary: 360 total security 9.0.0.1202 before 2017-07-07 allows privilege escalation via a trojan horse shcore.dll file in any directory in the path, as demonstrated by the c:\\python27 directory.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-08-07\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-6365", "mod_date": "2018-02-14", "pub_date": "2018-01-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in tsitebuilder 1.0 via the id parameter to /site.php, /pagelist.php, or /page_new.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in tsitebuilder 1.0 via the id parameter to /site.php, /pagelist.php, or /page_new.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-29\n- Last Modified Date: 2018-02-14" } ] }, { "Unnamed: 0": "CVE-2019-11448", "mod_date": "2019-05-06", "pub_date": "2019-04-22", "cvss": 10.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in zoho manageengine applications manager 11.0 through 14.0. an unauthenticated user can gain the authority of system on the server due to a popup_sla.jsp sid sql injection vulnerability. for example, the attacker can subsequently write arbitrary text to a .vbs file.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 10.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in zoho manageengine applications manager 11.0 through 14.0. an unauthenticated user can gain the authority of system on the server due to a popup_sla.jsp sid sql injection vulnerability. for example, the attacker can subsequently write arbitrary text to a .vbs file.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-04-22\n- Last Modified Date: 2019-05-06" } ] }, { "Unnamed: 0": "CVE-2008-6260", "mod_date": "2017-09-29", "pub_date": "2009-02-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in ultrastats 0.2.144 and 0.3.11 allows remote attackers to execute arbitrary sql commands via the serverid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in ultrastats 0.2.144 and 0.3.11 allows remote attackers to execute arbitrary sql commands via the serverid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-1731", "mod_date": "2017-08-17", "pub_date": "2009-05-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in panel/index.php in mlffat 2.1 allows remote attackers to execute arbitrary sql commands via a base64-encoded supervisor cookie.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in panel/index.php in mlffat 2.1 allows remote attackers to execute arbitrary sql commands via a base64-encoded supervisor cookie.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-20\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2008-6037", "mod_date": "2017-09-29", "pub_date": "2009-02-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in view.php in availscript article script allows remote attackers to execute arbitrary sql commands via the v parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in view.php in availscript article script allows remote attackers to execute arbitrary sql commands via the v parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-03\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-8488", "mod_date": "2018-11-27", "pub_date": "2018-10-10", "cvss": 3.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft sharepoint. this cve id is unique from cve-2018-8480, cve-2018-8498, cve-2018-8518.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft sharepoint. this cve id is unique from cve-2018-8480, cve-2018-8498, cve-2018-8518.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2018-10-10\n- Last Modified Date: 2018-11-27" } ] }, { "Unnamed: 0": "CVE-2009-0292", "mod_date": "2017-09-29", "pub_date": "2009-01-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in show_cat2.php in shop-inet 4 allows remote attackers to execute arbitrary sql commands via the grid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in show_cat2.php in shop-inet 4 allows remote attackers to execute arbitrary sql commands via the grid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-27\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-5220", "mod_date": "2018-10-15", "pub_date": "2007-10-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in catalog.asp in asp product catalog allows remote attackers to execute arbitrary sql commands via the cid parameter and possibly other parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in catalog.asp in asp product catalog allows remote attackers to execute arbitrary sql commands via the cid parameter and possibly other parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-10-05\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2017-17731", "mod_date": "2018-01-04", "pub_date": "2017-12-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "dedecms through 5.7 has sql injection via the $_files superglobal to plus/recommend.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: dedecms through 5.7 has sql injection via the $_files superglobal to plus/recommend.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-18\n- Last Modified Date: 2018-01-04" } ] }, { "Unnamed: 0": "CVE-2018-12464", "mod_date": "2019-10-09", "pub_date": "2018-06-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability in the web administration and quarantine components of micro focus secure messaging gateway allows an unauthenticated remote attacker to execute arbitrary sql statements against the database. this can be exploited to create an administrative account and used in conjunction with cve-2018-12465 to achieve unauthenticated remote code execution. affects micro focus secure messaging gateway versions prior to 471. it does not affect previous versions of the product that use the gwava product name (i.e. gwava 6.5).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability in the web administration and quarantine components of micro focus secure messaging gateway allows an unauthenticated remote attacker to execute arbitrary sql statements against the database. this can be exploited to create an administrative account and used in conjunction with cve-2018-12465 to achieve unauthenticated remote code execution. affects micro focus secure messaging gateway versions prior to 471. it does not affect previous versions of the product that use the gwava product name (i.e. gwava 6.5).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-06-29\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2008-5888", "mod_date": "2017-09-29", "pub_date": "2009-01-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in click&rank allow remote attackers to execute arbitrary sql commands via the id parameter to (1) hitcounter.asp, (2) user_delete.asp, and (3) user_update.asp; (4) the userid parameter to admin_login.asp (aka the username field in admin.asp); and (5) the password parameter to admin_login.asp (aka the password field in admin.asp). note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in click&rank allow remote attackers to execute arbitrary sql commands via the id parameter to (1) hitcounter.asp, (2) user_delete.asp, and (3) user_update.asp; (4) the userid parameter to admin_login.asp (aka the username field in admin.asp); and (5) the password parameter to admin_login.asp (aka the password field in admin.asp). note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-12\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-5887", "mod_date": "2017-09-29", "pub_date": "2007-11-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in boards/printer.asp in asp message board 2.2.1c allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in boards/printer.asp in asp message board 2.2.1c allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-11-07\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-2501", "mod_date": "2017-09-29", "pub_date": "2008-05-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in phphotoalbum 0.5 allow remote attackers to execute arbitrary sql commands via the (1) album parameter to thumbnails.php and the (2) pid parameter to displayimage.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in phphotoalbum 0.5 allow remote attackers to execute arbitrary sql commands via the (1) album parameter to thumbnails.php and the (2) pid parameter to displayimage.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-29\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-8480", "mod_date": "2017-07-25", "pub_date": "2017-02-08", "cvss": 7.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the qualcomm secure execution environment communicator driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31804432. references: qc-cr#1086186.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the qualcomm secure execution environment communicator driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31804432. references: qc-cr#1086186.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-02-08\n- Last Modified Date: 2017-07-25" } ] }, { "Unnamed: 0": "CVE-2015-9013", "mod_date": "2018-05-08", "pub_date": "2018-04-04", "cvss": 10.0, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in qualcomm closed source components. product: android. versions: android kernel. android id: a-36393251.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 10.0\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in qualcomm closed source components. product: android. versions: android kernel. android id: a-36393251.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-04-04\n- Last Modified Date: 2018-05-08" } ] }, { "Unnamed: 0": "CVE-2019-0734", "mod_date": "2019-05-20", "pub_date": "2019-05-16", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists in microsoft windows when a man-in-the-middle attacker is able to successfully decode and replace authentication request using kerberos, allowing an attacker to be validated as an administrator.the update addresses this vulnerability by changing how these requests are validated., aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-0936.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists in microsoft windows when a man-in-the-middle attacker is able to successfully decode and replace authentication request using kerberos, allowing an attacker to be validated as an administrator.the update addresses this vulnerability by changing how these requests are validated., aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-0936.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-05-16\n- Last Modified Date: 2019-05-20" } ] }, { "Unnamed: 0": "CVE-2018-7842", "mod_date": "2019-06-10", "pub_date": "2019-05-22", "cvss": 7.5, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "a cwe-290: authentication bypass by spoofing vulnerability exists in all versions of the modicon m580, modicon m340, modicon quantum, and modicon premium which could cause an elevation of privilege by conducting a brute force attack on modbus parameters sent to the controller.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.5\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: a cwe-290: authentication bypass by spoofing vulnerability exists in all versions of the modicon m580, modicon m340, modicon quantum, and modicon premium which could cause an elevation of privilege by conducting a brute force attack on modbus parameters sent to the controller.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-05-22\n- Last Modified Date: 2019-06-10" } ] }, { "Unnamed: 0": "CVE-2019-12650", "mod_date": "2019-10-09", "pub_date": "2019-09-25", "cvss": 9.0, "cwe_code": 78, "cwe_name": " Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", "summary": "multiple vulnerabilities in the web-based user interface (web ui) of cisco ios xe software could allow an authenticated, remote attacker to execute commands with elevated privileges on the affected device. for more information about these vulnerabilities, see the details section of this advisory.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 78:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.0\n- CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\n- Summary: multiple vulnerabilities in the web-based user interface (web ui) of cisco ios xe software could allow an authenticated, remote attacker to execute commands with elevated privileges on the affected device. for more information about these vulnerabilities, see the details section of this advisory.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-09-25\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2016-2566", "mod_date": "2017-04-21", "pub_date": "2017-04-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "samsung secemailsync on sm-g920f build g920fxxu2coh2 (galaxy s6) devices has sql injection, aka sve-2015-5081.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: samsung secemailsync on sm-g920f build g920fxxu2coh2 (galaxy s6) devices has sql injection, aka sve-2015-5081.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-04-13\n- Last Modified Date: 2017-04-21" } ] }, { "Unnamed: 0": "CVE-2010-2609", "mod_date": "2017-08-17", "pub_date": "2010-07-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in show_search_result.php in 2daybiz job search engine script allows remote attackers to execute arbitrary sql commands via the keyword parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in show_search_result.php in 2daybiz job search engine script allows remote attackers to execute arbitrary sql commands via the keyword parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-02\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2007-6168", "mod_date": "2011-03-08", "pub_date": "2007-11-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in default.asp in vu case manager allows remote attackers to execute arbitrary sql commands via the username parameter, a different vector than cve-2007-6143. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in default.asp in vu case manager allows remote attackers to execute arbitrary sql commands via the username parameter, a different vector than cve-2007-6143. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-11-29\n- Last Modified Date: 2011-03-08" } ] }, { "Unnamed: 0": "CVE-2017-0830", "mod_date": "2019-10-03", "pub_date": "2017-11-16", "cvss": 9.3, "cwe_code": 732, "cwe_name": " Incorrect Permission Assignment for Critical Resource", "summary": "an elevation of privilege vulnerability in the android framework (device policy client). product: android. versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. android id: a-62623498.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 732:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Incorrect Permission Assignment for Critical Resource\n- Summary: an elevation of privilege vulnerability in the android framework (device policy client). product: android. versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. android id: a-62623498.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-11-16\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2009-0739", "mod_date": "2017-09-29", "pub_date": "2009-02-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in login.php in mynews 0.10 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) passwd parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in login.php in mynews 0.10 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) passwd parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-25\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-4965", "mod_date": "2010-07-28", "pub_date": "2010-07-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the airware lexicon (air_lexicon) extension 0.0.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the airware lexicon (air_lexicon) extension 0.0.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-28\n- Last Modified Date: 2010-07-28" } ] }, { "Unnamed: 0": "CVE-2019-1087", "mod_date": "2019-07-17", "pub_date": "2019-07-15", "cvss": 4.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1086, cve-2019-1088.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1086, cve-2019-1088.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-07-15\n- Last Modified Date: 2019-07-17" } ] }, { "Unnamed: 0": "CVE-2015-9452", "mod_date": "2019-10-08", "pub_date": "2019-10-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the nex-forms-express-wp-form-builder plugin before 4.6.1 for wordpress has sql injection via the wp-admin/admin.php?page=nex-forms-main nex_forms_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the nex-forms-express-wp-form-builder plugin before 4.6.1 for wordpress has sql injection via the wp-admin/admin.php?page=nex-forms-main nex_forms_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-07\n- Last Modified Date: 2019-10-08" } ] }, { "Unnamed: 0": "CVE-2008-4657", "mod_date": "2011-03-08", "pub_date": "2008-10-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the econda plugin (econda) 0.0.2 and earlier extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the econda plugin (econda) 0.0.2 and earlier extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-22\n- Last Modified Date: 2011-03-08" } ] }, { "Unnamed: 0": "CVE-2009-4104", "mod_date": "2011-07-26", "pub_date": "2009-11-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in lyften designs lyftenbloggie (com_lyftenbloggie) component 1.0.4 for joomla! allows remote attackers to execute arbitrary sql commands via the author parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in lyften designs lyftenbloggie (com_lyftenbloggie) component 1.0.4 for joomla! allows remote attackers to execute arbitrary sql commands via the author parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-11-29\n- Last Modified Date: 2011-07-26" } ] }, { "Unnamed: 0": "CVE-2006-3048", "mod_date": "2018-10-18", "pub_date": "2006-06-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in tikiwiki 1.9.3.2 and possibly earlier versions allows remote attackers to execute arbitrary sql commands via unknown attack vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in tikiwiki 1.9.3.2 and possibly earlier versions allows remote attackers to execute arbitrary sql commands via unknown attack vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-06-16\n- Last Modified Date: 2018-10-18" } ] }, { "Unnamed: 0": "CVE-2019-1610", "mod_date": "2019-10-09", "pub_date": "2019-03-11", "cvss": 7.2, "cwe_code": 77, "cwe_name": " Improper Neutralization of Special Elements used in a Command ('Command Injection')", "summary": "a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability. nexus 3500 platform switches and nexus 3000 series switches software versions prior to 7.0(3)i7(4) are affected.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in a Command ('Command Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 77:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')\n- Summary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability. nexus 3500 platform switches and nexus 3000 series switches software versions prior to 7.0(3)i7(4) are affected.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-03-11\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2018-8168", "mod_date": "2018-06-05", "pub_date": "2018-05-09", "cvss": 3.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft sharepoint server, microsoft sharepoint. this cve id is unique from cve-2018-8149, cve-2018-8155, cve-2018-8156.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft sharepoint server, microsoft sharepoint. this cve id is unique from cve-2018-8149, cve-2018-8155, cve-2018-8156.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2018-05-09\n- Last Modified Date: 2018-06-05" } ] }, { "Unnamed: 0": "CVE-2018-10646", "mod_date": "2019-10-03", "pub_date": "2018-05-02", "cvss": 7.2, "cwe_code": 732, "cwe_name": " Incorrect Permission Assignment for Critical Resource", "summary": "cyberghost 6.5.0.3180 for windows suffers from a system privilege escalation vulnerability through the \"cg6service\" service. this service establishes a netnamedpipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. the \"connecttovpnserver\" method accepts a \"connectionparams\" argument that provides attacker control of the openvpn command line. an attacker can specify a dynamic library plugin that should run for every new vpn connection attempt. this plugin will execute code in the context of the system user.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 732:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Incorrect Permission Assignment for Critical Resource\n- Summary: cyberghost 6.5.0.3180 for windows suffers from a system privilege escalation vulnerability through the \"cg6service\" service. this service establishes a netnamedpipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. the \"connecttovpnserver\" method accepts a \"connectionparams\" argument that provides attacker control of the openvpn command line. an attacker can specify a dynamic library plugin that should run for every new vpn connection attempt. this plugin will execute code in the context of the system user.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-05-02\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2010-4635", "mod_date": "2017-08-17", "pub_date": "2010-12-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in detail.asp in site2nite vacation rental (vrbo) listings allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in detail.asp in site2nite vacation rental (vrbo) listings allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-12-30\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2010-1876", "mod_date": "2017-08-17", "pub_date": "2010-05-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in aj shopping cart 1.0 allows remote attackers to execute arbitrary sql commands via the maincatid parameter in a showmaincatlanding action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in aj shopping cart 1.0 allows remote attackers to execute arbitrary sql commands via the maincatid parameter in a showmaincatlanding action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-12\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2016-0161", "mod_date": "2018-10-12", "pub_date": "2016-04-12", "cvss": 4.3, "cwe_code": 254, "cwe_name": "7PK - Security Features", "summary": "microsoft edge allows remote attackers to bypass the same origin policy via unspecified vectors, aka \"microsoft edge elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0158.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: 7PK - Security Features." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 254:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.3\n- CWE Name: 7PK - Security Features\n- Summary: microsoft edge allows remote attackers to bypass the same origin policy via unspecified vectors, aka \"microsoft edge elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0158.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2016-04-12\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2019-1438", "mod_date": "2019-11-12", "pub_date": "2019-11-12", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists when the windows graphics component improperly handles objects in memory, aka 'windows graphics component elevation of privilege vulnerability'. this cve id is unique from cve-2019-1407, cve-2019-1433, cve-2019-1435, cve-2019-1437.", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists when the windows graphics component improperly handles objects in memory, aka 'windows graphics component elevation of privilege vulnerability'. this cve id is unique from cve-2019-1407, cve-2019-1433, cve-2019-1435, cve-2019-1437.\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-12\n- Last Modified Date: 2019-11-12" } ] }, { "Unnamed: 0": "CVE-2018-16880", "mod_date": "2019-05-16", "pub_date": "2019-01-29", "cvss": 6.9, "cwe_code": 787, "cwe_name": " Out-of-bounds Write", "summary": "a flaw was found in the linux kernel's handle_rx() function in the [vhost_net] driver. a malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. due to the nature of the flaw, privilege escalation cannot be fully ruled out. versions from v4.16 and newer are vulnerable.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Out-of-bounds Write." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 787:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Out-of-bounds Write\n- Summary: a flaw was found in the linux kernel's handle_rx() function in the [vhost_net] driver. a malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. due to the nature of the flaw, privilege escalation cannot be fully ruled out. versions from v4.16 and newer are vulnerable.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-01-29\n- Last Modified Date: 2019-05-16" } ] }, { "Unnamed: 0": "CVE-2010-4517", "mod_date": "2010-12-10", "pub_date": "2010-12-09", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the jextensions je auto (com_jeauto) component 1.0 for joomla!, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the char parameter in an item action to index.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the jextensions je auto (com_jeauto) component 1.0 for joomla!, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the char parameter in an item action to index.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-12-09\n- Last Modified Date: 2010-12-10" } ] }, { "Unnamed: 0": "CVE-2019-1625", "mod_date": "2019-10-09", "pub_date": "2019-06-20", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "a vulnerability in the cli of cisco sd-wan solution could allow an authenticated, local attacker to elevate lower-level privileges to the root user on an affected device. the vulnerability is due to insufficient authorization enforcement. an attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. a successful exploit could allow the attacker to make configuration changes to the system as the root user.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: a vulnerability in the cli of cisco sd-wan solution could allow an authenticated, local attacker to elevate lower-level privileges to the root user on an affected device. the vulnerability is due to insufficient authorization enforcement. an attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. a successful exploit could allow the attacker to make configuration changes to the system as the root user.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-06-20\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2008-5865", "mod_date": "2017-09-29", "pub_date": "2009-01-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the com_hbssearch component 1.0 in the hotel booking reservation system (aka hbs) 1.0.0 for joomla! allows remote attackers to execute arbitrary sql commands via the r_type parameter in a showhoteldetails action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the com_hbssearch component 1.0 in the hotel booking reservation system (aka hbs) 1.0.0 for joomla! allows remote attackers to execute arbitrary sql commands via the r_type parameter in a showhoteldetails action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-5132", "mod_date": "2017-09-29", "pub_date": "2008-11-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in inc/ajax/ajax_rating.php in memht portal 4.0.1 allows remote attackers to execute arbitrary sql commands via the x-forwarded-for http header.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in inc/ajax/ajax_rating.php in memht portal 4.0.1 allows remote attackers to execute arbitrary sql commands via the x-forwarded-for http header.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-18\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-6454", "mod_date": "2017-09-29", "pub_date": "2009-03-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in section.php in 6rbscript 3.3 allows remote attackers to execute arbitrary sql commands via the singerid parameter in a singers action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in section.php in 6rbscript 3.3 allows remote attackers to execute arbitrary sql commands via the singerid parameter in a singers action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-13\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2014-9605", "mod_date": "2019-02-01", "pub_date": "2015-09-04", "cvss": 9.4, "cwe_code": 287, "cwe_name": " Improper Authentication", "summary": "webupgrade in netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and create a system backup tarball, restart the server, or stop the filters on the server via a ' (single quote) character in the login and password parameters to webupgrade/webupgrade.php. note: this was originally reported as an sql injection vulnerability, but this may be inaccurate.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Authentication." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 287:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 9.4\n- CWE Name: Improper Authentication\n- Summary: webupgrade in netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and create a system backup tarball, restart the server, or stop the filters on the server via a ' (single quote) character in the login and password parameters to webupgrade/webupgrade.php. note: this was originally reported as an sql injection vulnerability, but this may be inaccurate.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/NONE/COMPLETE\n- Published Date: 2015-09-04\n- Last Modified Date: 2019-02-01" } ] }, { "Unnamed: 0": "CVE-2015-9395", "mod_date": "2019-09-20", "pub_date": "2019-09-20", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the users-ultra plugin before 1.5.64 for wordpress has sql injection via an ajax action.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the users-ultra plugin before 1.5.64 for wordpress has sql injection via an ajax action.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-20\n- Last Modified Date: 2019-09-20" } ] }, { "Unnamed: 0": "CVE-2019-5114", "mod_date": "2019-10-30", "pub_date": "2019-10-25", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an exploitable sql injection vulnerability exists in the authenticated portion of youphptube 7.6. specially crafted web requests can cause sql injections. an attacker can send a web request with parameters containing sql injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and,in certain configuration, access the underlying operating system.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an exploitable sql injection vulnerability exists in the authenticated portion of youphptube 7.6. specially crafted web requests can cause sql injections. an attacker can send a web request with parameters containing sql injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and,in certain configuration, access the underlying operating system.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-25\n- Last Modified Date: 2019-10-30" } ] }, { "Unnamed: 0": "CVE-2015-7346", "mod_date": "2017-06-12", "pub_date": "2017-06-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in zcms 1.1.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in zcms 1.1.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-06-07\n- Last Modified Date: 2017-06-12" } ] }, { "Unnamed: 0": "CVE-2008-5273", "mod_date": "2017-09-29", "pub_date": "2008-11-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in viewnews.asp in todd woolums asp news management 2.2 allows remote attackers to execute arbitrary sql commands via the newsid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in viewnews.asp in todd woolums asp news management 2.2 allows remote attackers to execute arbitrary sql commands via the newsid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-28\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2014-100031", "mod_date": "2017-09-08", "pub_date": "2015-01-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in ganesha digital library (gdl) 4.2 allow remote attackers to execute arbitrary sql commands via the id parameter in (1) download.php or (2) main.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in ganesha digital library (gdl) 4.2 allow remote attackers to execute arbitrary sql commands via the id parameter in (1) download.php or (2) main.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-13\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2006-1500", "mod_date": "2017-07-20", "pub_date": "2006-03-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in tilde cms 3.0 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in tilde cms 3.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-03-30\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2008-6485", "mod_date": "2017-09-29", "pub_date": "2009-03-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in softcomplex php image gallery allows remote attackers to execute arbitrary sql commands via the ctg parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in softcomplex php image gallery allows remote attackers to execute arbitrary sql commands via the ctg parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-18\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-4348", "mod_date": "2017-08-08", "pub_date": "2008-09-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in photo.php in phportfolio, possibly 1.3, allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in photo.php in phportfolio, possibly 1.3, allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-30\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2018-4037", "mod_date": "2019-01-16", "pub_date": "2019-01-10", "cvss": 6.6, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "the cleanmymac x software contains an exploitable privilege escalation vulnerability due to improper input validation. an attacker with local access can use this vulnerability to modify the file system as root.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "NONE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.6\n- CWE Name: Improper Input Validation\n- Summary: the cleanmymac x software contains an exploitable privilege escalation vulnerability due to improper input validation. an attacker with local access can use this vulnerability to modify the file system as root.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): NONE/COMPLETE/COMPLETE\n- Published Date: 2019-01-10\n- Last Modified Date: 2019-01-16" } ] }, { "Unnamed: 0": "CVE-2008-3302", "mod_date": "2017-09-29", "pub_date": "2008-07-25", "cvss": 6.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/delete.php in bilboblog 0.2.1, when magic_quotes_gpc is disabled, allows remote authenticated administrators to execute arbitrary sql commands via the num parameter.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/delete.php in bilboblog 0.2.1, when magic_quotes_gpc is disabled, allows remote authenticated administrators to execute arbitrary sql commands via the num parameter.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-25\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2012-2923", "mod_date": "2017-08-29", "pub_date": "2012-05-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in news.php4 in hypermethod elearning server 4g allows remote attackers to execute arbitrary sql commands via the nid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in news.php4 in hypermethod elearning server 4g allows remote attackers to execute arbitrary sql commands via the nid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-05-21\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2019-12679", "mod_date": "2019-10-09", "pub_date": "2019-10-02", "cvss": 9.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple vulnerabilities in the web-based management interface of cisco firepower management center (fmc) software could allow an authenticated, remote attacker to execute arbitrary sql injections on an affected device. these vulnerabilities exist due to improper input validation. an attacker could exploit these vulnerabilities by sending crafted sql queries to an affected device. a successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 9.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple vulnerabilities in the web-based management interface of cisco firepower management center (fmc) software could allow an authenticated, remote attacker to execute arbitrary sql injections on an affected device. these vulnerabilities exist due to improper input validation. an attacker could exploit these vulnerabilities by sending crafted sql queries to an affected device. a successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-10-02\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2015-9449", "mod_date": "2019-09-26", "pub_date": "2019-09-26", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the microblog-poster plugin before 1.6.2 for wordpress has sql injection via the wp-admin/options-general.php?page=microblogposter.php account_id parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the microblog-poster plugin before 1.6.2 for wordpress has sql injection via the wp-admin/options-general.php?page=microblogposter.php account_id parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-26\n- Last Modified Date: 2019-09-26" } ] }, { "Unnamed: 0": "CVE-2017-15973", "mod_date": "2017-11-16", "pub_date": "2017-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sokial social network script 1.0 allows sql injection via the id parameter to admin/members_view.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sokial social network script 1.0 allows sql injection via the id parameter to admin/members_view.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-29\n- Last Modified Date: 2017-11-16" } ] }, { "Unnamed: 0": "CVE-2018-10997", "mod_date": "2018-08-14", "pub_date": "2018-06-17", "cvss": 10.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "etere etereweb before 28.1.20 has a pre-authentication blind sql injection in the post parameters txusername and txpassword.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 10.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: etere etereweb before 28.1.20 has a pre-authentication blind sql injection in the post parameters txusername and txpassword.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-06-17\n- Last Modified Date: 2018-08-14" } ] }, { "Unnamed: 0": "CVE-2008-3787", "mod_date": "2017-09-29", "pub_date": "2008-08-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in listing_view.php in web directory script 2.0 and earlier allows remote attackers to execute arbitrary sql commands via the name parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in listing_view.php in web directory script 2.0 and earlier allows remote attackers to execute arbitrary sql commands via the name parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-08-26\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2014-6242", "mod_date": "2018-10-09", "pub_date": "2014-10-02", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the all in one wp security & firewall plugin before 3.8.3 for wordpress allow remote authenticated users to execute arbitrary sql commands via the (1) orderby or (2) order parameter in the aiowpsec page to wp-admin/admin.php. note: this can be leveraged using csrf to allow remote attackers to execute arbitrary sql commands.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the all in one wp security & firewall plugin before 3.8.3 for wordpress allow remote authenticated users to execute arbitrary sql commands via the (1) orderby or (2) order parameter in the aiowpsec page to wp-admin/admin.php. note: this can be leveraged using csrf to allow remote attackers to execute arbitrary sql commands.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-10-02\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2019-0958", "mod_date": "2019-05-17", "pub_date": "2019-05-16", "cvss": 6.5, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka 'microsoft sharepoint elevation of privilege vulnerability'. this cve id is unique from cve-2019-0957.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka 'microsoft sharepoint elevation of privilege vulnerability'. this cve id is unique from cve-2019-0957.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-05-16\n- Last Modified Date: 2019-05-17" } ] }, { "Unnamed: 0": "CVE-2017-17970", "mod_date": "2018-01-31", "pub_date": "2018-01-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in muviko 1.1 allow remote attackers to execute arbitrary sql commands via the (1) email parameter to login.php; the (2) season_id parameter to themes/flixer/ajax/load_season.php; the (3) movie_id parameter to themes/flixer/ajax/get_rating.php; the (4) rating or (5) movie_id parameter to themes/flixer/ajax/update_rating.php; or the (6) id parameter to themes/flixer/ajax/set_player_source.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in muviko 1.1 allow remote attackers to execute arbitrary sql commands via the (1) email parameter to login.php; the (2) season_id parameter to themes/flixer/ajax/load_season.php; the (3) movie_id parameter to themes/flixer/ajax/get_rating.php; the (4) rating or (5) movie_id parameter to themes/flixer/ajax/update_rating.php; or the (6) id parameter to themes/flixer/ajax/set_player_source.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-12\n- Last Modified Date: 2018-01-31" } ] }, { "Unnamed: 0": "CVE-2013-3523", "mod_date": "2017-08-29", "pub_date": "2013-05-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in this html is simple (this) before 1.2.4 allows remote to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in this html is simple (this) before 1.2.4 allows remote to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-05-10\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2007-0984", "mod_date": "2017-10-11", "pub_date": "2007-02-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin_poll.asp in pollmentor 2.0 allows remote attackers to execute arbitrary sql commands via the id parameter to pollmentorres.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin_poll.asp in pollmentor 2.0 allows remote attackers to execute arbitrary sql commands via the id parameter to pollmentorres.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-02-16\n- Last Modified Date: 2017-10-11" } ] }, { "Unnamed: 0": "CVE-2015-4426", "mod_date": "2016-06-09", "pub_date": "2015-08-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in pimcore before build 3473 allows remote attackers to execute arbitrary sql commands via the filter parameter to admin/asset/grid-proxy.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in pimcore before build 3473 allows remote attackers to execute arbitrary sql commands via the filter parameter to admin/asset/grid-proxy.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-08-18\n- Last Modified Date: 2016-06-09" } ] }, { "Unnamed: 0": "CVE-2008-2862", "mod_date": "2018-10-11", "pub_date": "2008-06-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in elinestudio site composer (esc) 2.6 and earlier allow remote attackers to execute arbitrary sql commands via the (1) id parameter to ansfaq.asp and the (2) template_id parameter to preview.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in elinestudio site composer (esc) 2.6 and earlier allow remote attackers to execute arbitrary sql commands via the (1) id parameter to ansfaq.asp and the (2) template_id parameter to preview.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-25\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2018-16432", "mod_date": "2018-10-25", "pub_date": "2018-09-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "bluecms 1.6 allows sql injection via the user_name parameter to uploads/user.php?act=index_login.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: bluecms 1.6 allows sql injection via the user_name parameter to uploads/user.php?act=index_login.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-09-04\n- Last Modified Date: 2018-10-25" } ] }, { "Unnamed: 0": "CVE-2008-4782", "mod_date": "2017-09-29", "pub_date": "2008-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in public/code/cp_polls_results.php in all in one control panel (aiocp) 1.4 allows remote attackers to execute arbitrary sql commands via the poll_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in public/code/cp_polls_results.php in all in one control panel (aiocp) 1.4 allows remote attackers to execute arbitrary sql commands via the poll_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-29\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-0333", "mod_date": "2017-10-19", "pub_date": "2009-01-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the webamoeba (wa) ticket system (com_waticketsystem) component for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter in a category action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the webamoeba (wa) ticket system (com_waticketsystem) component for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter in a category action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-29\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2012-1506", "mod_date": "2017-08-29", "pub_date": "2014-09-17", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the updatestatus function in lib/models/benefits/hsp.php in orangehrm before 2.7 allows remote authenticated users to execute arbitrary sql commands via the hspsummaryid parameter to plugins/ajaxcalls/haltresumehsp.php. note: some of these details are obtained from third party information.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the updatestatus function in lib/models/benefits/hsp.php in orangehrm before 2.7 allows remote authenticated users to execute arbitrary sql commands via the hspsummaryid parameter to plugins/ajaxcalls/haltresumehsp.php. note: some of these details are obtained from third party information.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-09-17\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2019-12685", "mod_date": "2019-10-09", "pub_date": "2019-10-02", "cvss": 9.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple vulnerabilities in the web-based management interface of cisco firepower management center (fmc) software could allow an authenticated, remote attacker to execute arbitrary sql injections on an affected device. these vulnerabilities exist due to improper input validation. an attacker could exploit these vulnerabilities by sending crafted sql queries to an affected device. a successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 9.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple vulnerabilities in the web-based management interface of cisco firepower management center (fmc) software could allow an authenticated, remote attacker to execute arbitrary sql injections on an affected device. these vulnerabilities exist due to improper input validation. an attacker could exploit these vulnerabilities by sending crafted sql queries to an affected device. a successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-10-02\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2010-1588", "mod_date": "2017-08-17", "pub_date": "2010-04-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the getwebsess function in shopsessionsubs.asp in rocksalt international vp-asp shopping cart 6.50 and earlier allows remote attackers to execute arbitrary sql commands via the websess parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the getwebsess function in shopsessionsubs.asp in rocksalt international vp-asp shopping cart 6.50 and earlier allows remote attackers to execute arbitrary sql commands via the websess parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-28\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2019-1378", "mod_date": "2019-10-15", "pub_date": "2019-10-10", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists in windows 10 update assistant in the way it handles permissions.a locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'windows 10 update assistant elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists in windows 10 update assistant in the way it handles permissions.a locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'windows 10 update assistant elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-10-10\n- Last Modified Date: 2019-10-15" } ] }, { "Unnamed: 0": "CVE-2007-2803", "mod_date": "2017-10-11", "pub_date": "2007-05-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in default.asp in vizayn urun tanitim sitesi 0.2 allows remote attackers to execute arbitrary sql commands via the id parameter in a haberdetay action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in default.asp in vizayn urun tanitim sitesi 0.2 allows remote attackers to execute arbitrary sql commands via the id parameter in a haberdetay action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-05-22\n- Last Modified Date: 2017-10-11" } ] }, { "Unnamed: 0": "CVE-2010-1050", "mod_date": "2010-03-23", "pub_date": "2010-03-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in audistat 1.3 allows remote attackers to execute arbitrary sql commands via the mday parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in audistat 1.3 allows remote attackers to execute arbitrary sql commands via the mday parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-23\n- Last Modified Date: 2010-03-23" } ] }, { "Unnamed: 0": "CVE-2009-3590", "mod_date": "2017-09-19", "pub_date": "2009-10-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in showcat.php in vs panel 7.3.6 allows remote attackers to execute arbitrary sql commands via the cat_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in showcat.php in vs panel 7.3.6 allows remote attackers to execute arbitrary sql commands via the cat_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-10-08\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2019-6296", "mod_date": "2019-01-18", "pub_date": "2019-01-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "cleanto 5.0 has sql injection via the assets/lib/export_ajax.php id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: cleanto 5.0 has sql injection via the assets/lib/export_ajax.php id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-01-15\n- Last Modified Date: 2019-01-18" } ] }, { "Unnamed: 0": "CVE-2009-4696", "mod_date": "2017-09-19", "pub_date": "2010-03-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in radnics gold 5 allows remote attackers to execute arbitrary sql commands via the fid parameter in a view_forum action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in radnics gold 5 allows remote attackers to execute arbitrary sql commands via the fid parameter in a view_forum action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-10\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-6134", "mod_date": "2017-08-17", "pub_date": "2009-02-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in everyblog 5.x and 6.x, a module for drupal, allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in everyblog 5.x and 6.x, a module for drupal, allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-14\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2017-14757", "mod_date": "2017-10-18", "pub_date": "2017-10-03", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "opentext document sciences xpression (formerly emc document sciences xpression) v4.5sp1 patch 13 (older versions might be affected as well) is prone to sql injection: /xdashboard/html/jobhistory/downloadsupportfile.action, parameter: jobrunid. in order for this vulnerability to be exploited, an attacker must authenticate to the application first.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: opentext document sciences xpression (formerly emc document sciences xpression) v4.5sp1 patch 13 (older versions might be affected as well) is prone to sql injection: /xdashboard/html/jobhistory/downloadsupportfile.action, parameter: jobrunid. in order for this vulnerability to be exploited, an attacker must authenticate to the application first.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-03\n- Last Modified Date: 2017-10-18" } ] }, { "Unnamed: 0": "CVE-2008-1336", "mod_date": "2018-10-11", "pub_date": "2008-03-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in koobi cms 4.2.3 through 4.3.0 allows remote attackers to execute arbitrary sql commands via the categ parameter in a links action to index.php, a different vector than cve-2008-1122.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in koobi cms 4.2.3 through 4.3.0 allows remote attackers to execute arbitrary sql commands via the categ parameter in a links action to index.php, a different vector than cve-2008-1122.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-13\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2016-8769", "mod_date": "2017-09-03", "pub_date": "2017-04-02", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "huawei utps earlier than utps-v200r003b015d16spc00c983 has an unquoted service path vulnerability which can lead to the truncation of utps service query paths. an attacker may put an executable file in the search path of the affected service and obtain elevated privileges after the executable file is executed.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: huawei utps earlier than utps-v200r003b015d16spc00c983 has an unquoted service path vulnerability which can lead to the truncation of utps service query paths. an attacker may put an executable file in the search path of the affected service and obtain elevated privileges after the executable file is executed.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-04-02\n- Last Modified Date: 2017-09-03" } ] }, { "Unnamed: 0": "CVE-2008-5003", "mod_date": "2017-09-29", "pub_date": "2008-11-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ndetail.php in shahrood allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ndetail.php in shahrood allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-10\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2014-9237", "mod_date": "2014-12-05", "pub_date": "2014-12-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in proticaret e-commerce 3.0 allows remote attackers to execute arbitrary sql commands via a tem:code element in a soap request.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in proticaret e-commerce 3.0 allows remote attackers to execute arbitrary sql commands via a tem:code element in a soap request.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-12-03\n- Last Modified Date: 2014-12-05" } ] }, { "Unnamed: 0": "CVE-2013-2690", "mod_date": "2017-08-29", "pub_date": "2013-03-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in synchroweb technology synconnect 2.0 allows remote attackers to execute arbitrary sql commands via the loginid parameter in a logoff action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in synchroweb technology synconnect 2.0 allows remote attackers to execute arbitrary sql commands via the loginid parameter in a logoff action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-03-28\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2015-1441", "mod_date": "2015-02-04", "pub_date": "2015-02-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in piwigo before 2.5.6, 2.6.x before 2.6.5, and 2.7.x before 2.7.3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in piwigo before 2.5.6, 2.6.x before 2.6.5, and 2.7.x before 2.7.3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-02-03\n- Last Modified Date: 2015-02-04" } ] }, { "Unnamed: 0": "CVE-2016-9038", "mod_date": "2018-06-13", "pub_date": "2018-04-24", "cvss": 4.4, "cwe_code": 362, "cwe_name": " Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", "summary": "an exploitable double fetch vulnerability exists in the sboxdrv.sys driver functionality of invincea-x 6.1.3-24058. a specially crafted input buffer and race condition can result in kernel memory corruption, which could result in privilege escalation. an attacker needs to execute a special application locally to trigger this vulnerability.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 362:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.4\n- CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\n- Summary: an exploitable double fetch vulnerability exists in the sboxdrv.sys driver functionality of invincea-x 6.1.3-24058. a specially crafted input buffer and race condition can result in kernel memory corruption, which could result in privilege escalation. an attacker needs to execute a special application locally to trigger this vulnerability.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-04-24\n- Last Modified Date: 2018-06-13" } ] }, { "Unnamed: 0": "CVE-2010-4812", "mod_date": "2017-08-29", "pub_date": "2011-07-08", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in 6kbbs 8.0 build 20100901 allow remote attackers to execute arbitrary sql commands via the (1) tids[] parameter to ajaxadmin.php and the (2) msgids[] parameter to ajaxmember.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in 6kbbs 8.0 build 20100901 allow remote attackers to execute arbitrary sql commands via the (1) tids[] parameter to ajaxadmin.php and the (2) msgids[] parameter to ajaxmember.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-07-08\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-0800", "mod_date": "2017-09-29", "pub_date": "2008-02-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the mcquiz (com_mcquiz) 0.9 final component for joomla! allows remote attackers to execute arbitrary sql commands via the tid parameter in a user_tst_shw action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the mcquiz (com_mcquiz) 0.9 final component for joomla! allows remote attackers to execute arbitrary sql commands via the tid parameter in a user_tst_shw action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-15\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-11088", "mod_date": "2018-09-04", "pub_date": "2018-07-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "improper input validation in linux io-prefetch in snapdragon mobile and snapdragon wear, a sql injection vulnerability exists in versions msm8909w, msm8996au, sd 210/sd 212/sd 205, sd 430, sd 450, sd 617, sd 625, sd 650/52, sd 820, sd 835, sd 845.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: improper input validation in linux io-prefetch in snapdragon mobile and snapdragon wear, a sql injection vulnerability exists in versions msm8909w, msm8996au, sd 210/sd 212/sd 205, sd 430, sd 450, sd 617, sd 625, sd 650/52, sd 820, sd 835, sd 845.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-07-06\n- Last Modified Date: 2018-09-04" } ] }, { "Unnamed: 0": "CVE-2006-2259", "mod_date": "2017-07-20", "pub_date": "2006-05-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in logon.asp in maxxschedule 1.0 allows remote attackers to execute arbitrary sql commands via the txtlogon parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in logon.asp in maxxschedule 1.0 allows remote attackers to execute arbitrary sql commands via the txtlogon parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-05-09\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2010-0338", "mod_date": "2011-02-01", "pub_date": "2010-01-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the tt_products editor (ttpedit) extension 0.0.2 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the tt_products editor (ttpedit) extension 0.0.2 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-15\n- Last Modified Date: 2011-02-01" } ] }, { "Unnamed: 0": "CVE-2008-6179", "mod_date": "2017-09-29", "pub_date": "2009-02-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in sug_cat.php in indexscript 3.0 allows remote attackers to execute arbitrary sql commands via the parent_id parameter, a different vector than cve-2007-4069.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in sug_cat.php in indexscript 3.0 allows remote attackers to execute arbitrary sql commands via the parent_id parameter, a different vector than cve-2007-4069.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-19\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-18387", "mod_date": "2019-10-28", "pub_date": "2019-10-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sourcecodester hotel and lodge management system 1.0 is vulnerable to unauthenticated sql injection and can allow remote attackers to execute arbitrary sql commands via the id parameter to the edit page for customer, room, currency, room booking details, or tax details.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sourcecodester hotel and lodge management system 1.0 is vulnerable to unauthenticated sql injection and can allow remote attackers to execute arbitrary sql commands via the id parameter to the edit page for customer, room, currency, room booking details, or tax details.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-23\n- Last Modified Date: 2019-10-28" } ] }, { "Unnamed: 0": "CVE-2008-0921", "mod_date": "2017-09-29", "pub_date": "2008-02-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in news.php in becontent 0.3.1 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in news.php in becontent 0.3.1 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-0324", "mod_date": "2017-09-29", "pub_date": "2009-01-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in bibciter 1.4 allow remote attackers to execute arbitrary sql commands via the (1) idp parameter to reports/projects.php, the (2) idc parameter to reports/contacts.php, and the (3) idu parameter to reports/users.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in bibciter 1.4 allow remote attackers to execute arbitrary sql commands via the (1) idp parameter to reports/projects.php, the (2) idc parameter to reports/contacts.php, and the (3) idu parameter to reports/users.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-29\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2015-0003", "mod_date": "2019-05-14", "pub_date": "2015-02-11", "cvss": 6.9, "cwe_code": 476, "cwe_name": " NULL Pointer Dereference", "summary": "win32k.sys in the kernel-mode drivers in microsoft windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 allows local users to gain privileges or cause a denial of service (null pointer dereference) via a crafted application, aka \"win32k elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: NULL Pointer Dereference." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 476:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: NULL Pointer Dereference\n- Summary: win32k.sys in the kernel-mode drivers in microsoft windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 allows local users to gain privileges or cause a denial of service (null pointer dereference) via a crafted application, aka \"win32k elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-02-11\n- Last Modified Date: 2019-05-14" } ] }, { "Unnamed: 0": "CVE-2019-15561", "mod_date": "2019-08-28", "pub_date": "2019-08-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "flashlingo before 2019-06-12 allows sql injection, related to flashlingo.js and db.js.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: flashlingo before 2019-06-12 allows sql injection, related to flashlingo.js and db.js.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-26\n- Last Modified Date: 2019-08-28" } ] }, { "Unnamed: 0": "CVE-2011-0645", "mod_date": "2017-08-17", "pub_date": "2011-01-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in data.php in phpcms 2008 v2 allows remote attackers to execute arbitrary sql commands via the where_time parameter in a get action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in data.php in phpcms 2008 v2 allows remote attackers to execute arbitrary sql commands via the where_time parameter in a get action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-01-25\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2017-5574", "mod_date": "2017-01-26", "pub_date": "2017-01-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in register.php in genixcms before 1.0.0 allows unauthenticated users to execute arbitrary sql commands via the activation parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in register.php in genixcms before 1.0.0 allows unauthenticated users to execute arbitrary sql commands via the activation parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-01-23\n- Last Modified Date: 2017-01-26" } ] }, { "Unnamed: 0": "CVE-2015-9012", "mod_date": "2018-05-08", "pub_date": "2018-04-04", "cvss": 10.0, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in qualcomm closed source components. product: android. versions: android kernel. android id: a-36384691.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 10.0\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in qualcomm closed source components. product: android. versions: android kernel. android id: a-36384691.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-04-04\n- Last Modified Date: 2018-05-08" } ] }, { "Unnamed: 0": "CVE-2009-4070", "mod_date": "2009-11-24", "pub_date": "2009-11-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in gforge 4.5.14, 4.7.3, and possibly other versions allows remote attackers to execute arbitrary sql commands via unknown vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in gforge 4.5.14, 4.7.3, and possibly other versions allows remote attackers to execute arbitrary sql commands via unknown vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-11-24\n- Last Modified Date: 2009-11-24" } ] }, { "Unnamed: 0": "CVE-2018-7313", "mod_date": "2018-03-05", "pub_date": "2018-02-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the cw tags 2.0.6 component for joomla! via the searchtext array parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the cw tags 2.0.6 component for joomla! via the searchtext array parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-22\n- Last Modified Date: 2018-03-05" } ] }, { "Unnamed: 0": "CVE-2014-5071", "mod_date": "2018-01-30", "pub_date": "2018-01-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the checkpassword function in symmetricom s350i 2.70.15 allows remote attackers to execute arbitrary sql commands via vectors involving a username.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the checkpassword function in symmetricom s350i 2.70.15 allows remote attackers to execute arbitrary sql commands via vectors involving a username.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-08\n- Last Modified Date: 2018-01-30" } ] }, { "Unnamed: 0": "CVE-2009-0493", "mod_date": "2017-09-29", "pub_date": "2009-02-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in login.php in it!cms 2.1a and earlier allows remote attackers to execute arbitrary sql commands via the username.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in login.php in it!cms 2.1a and earlier allows remote attackers to execute arbitrary sql commands via the username.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-10\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-18806", "mod_date": "2018-12-17", "pub_date": "2018-11-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "school equipment monitoring system 1.0 allows sql injection via the login screen, related to include/user.vb.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: school equipment monitoring system 1.0 allows sql injection via the login screen, related to include/user.vb.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-11-16\n- Last Modified Date: 2018-12-17" } ] }, { "Unnamed: 0": "CVE-2019-1229", "mod_date": "2019-08-22", "pub_date": "2019-08-14", "cvss": 6.5, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists in dynamics on-premise v9, aka 'dynamics on-premise elevation of privilege vulnerability'.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists in dynamics on-premise v9, aka 'dynamics on-premise elevation of privilege vulnerability'.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-14\n- Last Modified Date: 2019-08-22" } ] }, { "Unnamed: 0": "CVE-2017-2120", "mod_date": "2017-05-03", "pub_date": "2017-04-28", "cvss": 6.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the wbce cms 1.1.10 and earlier allows attacker with administrator rights to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the wbce cms 1.1.10 and earlier allows attacker with administrator rights to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-04-28\n- Last Modified Date: 2017-05-03" } ] }, { "Unnamed: 0": "CVE-2009-4982", "mod_date": "2017-09-19", "pub_date": "2010-08-25", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the select function in irokez cms 0.7.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the path_info to the default uri.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the select function in irokez cms 0.7.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the path_info to the default uri.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-08-25\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2011-4921", "mod_date": "2017-08-29", "pub_date": "2012-01-04", "cvss": 5.1, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in usersettings.php in e107 0.7.26, and possibly other versions before 1.0.0, allows remote attackers to execute arbitrary sql commands via the username parameter.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.1\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in usersettings.php in e107 0.7.26, and possibly other versions before 1.0.0, allows remote attackers to execute arbitrary sql commands via the username parameter.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-01-04\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2010-1701", "mod_date": "2010-05-04", "pub_date": "2010-05-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in browse.html in php video battle script allows remote attackers to execute arbitrary sql commands via the cat parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in browse.html in php video battle script allows remote attackers to execute arbitrary sql commands via the cat parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-04\n- Last Modified Date: 2010-05-04" } ] }, { "Unnamed: 0": "CVE-2018-7463", "mod_date": "2018-03-17", "pub_date": "2018-02-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in files.php in the \"files\" component in asanhamayesh cms 3.4.6 allows a remote attacker to execute arbitrary sql commands via the \"id\" parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in files.php in the \"files\" component in asanhamayesh cms 3.4.6 allows a remote attacker to execute arbitrary sql commands via the \"id\" parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-26\n- Last Modified Date: 2018-03-17" } ] }, { "Unnamed: 0": "CVE-2012-3032", "mod_date": "2012-09-19", "pub_date": "2012-09-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in webnavigator in siemens wincc 7.0 sp3 and earlier, as used in simatic pcs7 and other products, allows remote attackers to execute arbitrary sql commands via a crafted soap message.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in webnavigator in siemens wincc 7.0 sp3 and earlier, as used in simatic pcs7 and other products, allows remote attackers to execute arbitrary sql commands via a crafted soap message.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-09-18\n- Last Modified Date: 2012-09-19" } ] }, { "Unnamed: 0": "CVE-2015-8332", "mod_date": "2017-09-08", "pub_date": "2017-08-28", "cvss": 6.5, "cwe_code": 287, "cwe_name": " Improper Authentication", "summary": "huawei video content management (vcm) before v100r001c10spc001 does not properly \"authenticate online user identities and privileges,\" which allows remote authenticated users to gain privileges and perform a case operation as another user via a crafted message, aka \"horizontal privilege escalation vulnerability.\"", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Authentication." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 287:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Authentication\n- Summary: huawei video content management (vcm) before v100r001c10spc001 does not properly \"authenticate online user identities and privileges,\" which allows remote authenticated users to gain privileges and perform a case operation as another user via a crafted message, aka \"horizontal privilege escalation vulnerability.\"\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-08-28\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2008-6805", "mod_date": "2017-09-29", "pub_date": "2009-05-11", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in mic_blog 0.0.3, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) cat parameter to category.php, the (2) user parameter to login.php, and the (3) site parameter to register.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in mic_blog 0.0.3, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) cat parameter to category.php, the (2) user parameter to login.php, and the (3) site parameter to register.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-11\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-4992", "mod_date": "2017-09-19", "pub_date": "2010-08-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in paidbanner.php in lm starmail paidmail 2.0 allows remote attackers to execute arbitrary sql commands via the id parameter. note: http://inj3ct0r.com/exploits/5624", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in paidbanner.php in lm starmail paidmail 2.0 allows remote attackers to execute arbitrary sql commands via the id parameter. note: http://inj3ct0r.com/exploits/5624\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-08-25\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2018-17377", "mod_date": "2018-11-14", "pub_date": "2018-09-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the questions 1.4.3 component for joomla! via the term, userid, users, or groups parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the questions 1.4.3 component for joomla! via the term, userid, users, or groups parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-09-28\n- Last Modified Date: 2018-11-14" } ] }, { "Unnamed: 0": "CVE-2006-2800", "mod_date": "2017-07-20", "pub_date": "2006-06-03", "cvss": 6.8, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "multiple cross-site scripting (xss) vulnerabilities in unak cms 1.5 rc2 and earlier allow remote attackers to inject arbitrary web script or html via the (1) u_a or (2) u_s parameters. note: this might be resultant from sql injection.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: multiple cross-site scripting (xss) vulnerabilities in unak cms 1.5 rc2 and earlier allow remote attackers to inject arbitrary web script or html via the (1) u_a or (2) u_s parameters. note: this might be resultant from sql injection.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-06-03\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2019-13571", "mod_date": "2019-08-06", "pub_date": "2019-07-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability exists in the vsourz digital advanced cf7 db plugin through 1.6.1 for wordpress. successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary sql commands on the affected system.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability exists in the vsourz digital advanced cf7 db plugin through 1.6.1 for wordpress. successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary sql commands on the affected system.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-07-29\n- Last Modified Date: 2019-08-06" } ] }, { "Unnamed: 0": "CVE-2008-2983", "mod_date": "2017-09-29", "pub_date": "2008-07-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in demo4 cms 01 beta allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in demo4 cms 01 beta allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-02\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2005-4617", "mod_date": "2017-07-20", "pub_date": "2005-12-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in tickets.php in csupport 1.0 and earlier allows remote attackers to execute arbitrary sql commands via the pg parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in tickets.php in csupport 1.0 and earlier allows remote attackers to execute arbitrary sql commands via the pg parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-12-31\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2018-5960", "mod_date": "2018-02-12", "pub_date": "2018-01-22", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "zenario v7.1 - v7.6 has sql injection via the `name` input field of organizer.php or admin_boxes.ajax.php in the `categories - edit` module.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: zenario v7.1 - v7.6 has sql injection via the `name` input field of organizer.php or admin_boxes.ajax.php in the `categories - edit` module.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-22\n- Last Modified Date: 2018-02-12" } ] }, { "Unnamed: 0": "CVE-2010-1720", "mod_date": "2017-08-17", "pub_date": "2010-05-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the q-personel (com_qpersonel) component 1.0.2 and earlier for joomla! allows remote attackers to execute arbitrary sql commands via the katid parameter in a qplistele action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the q-personel (com_qpersonel) component 1.0.2 and earlier for joomla! allows remote attackers to execute arbitrary sql commands via the katid parameter in a qplistele action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-04\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2014-3935", "mod_date": "2014-06-03", "pub_date": "2014-06-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in glossaire-aff.php in the glossaire module 1.0 for xoops allows remote attackers to execute arbitrary sql commands via the lettre parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in glossaire-aff.php in the glossaire module 1.0 for xoops allows remote attackers to execute arbitrary sql commands via the lettre parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-06-02\n- Last Modified Date: 2014-06-03" } ] }, { "Unnamed: 0": "CVE-2011-1048", "mod_date": "2011-02-22", "pub_date": "2011-02-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in product.php in mihantools 1.33 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in product.php in mihantools 1.33 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-02-21\n- Last Modified Date: 2011-02-22" } ] }, { "Unnamed: 0": "CVE-2010-1521", "mod_date": "2018-10-10", "pub_date": "2010-06-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in include/classes/tzn_user.php in taskfreak! original multi user before 0.6.4 allows remote attackers to execute arbitrary sql commands via the password parameter to login.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in include/classes/tzn_user.php in taskfreak! original multi user before 0.6.4 allows remote attackers to execute arbitrary sql commands via the password parameter to login.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-06-30\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2007-5678", "mod_date": "2018-10-15", "pub_date": "2007-10-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the music module in phpbasic allows remote attackers to execute arbitrary sql commands via the id parameter in a view action to the default uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the music module in phpbasic allows remote attackers to execute arbitrary sql commands via the id parameter in a view action to the default uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-10-24\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2011-0511", "mod_date": "2017-08-17", "pub_date": "2011-01-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the allcinevid component (com_allcinevid) 1.0.0 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the allcinevid component (com_allcinevid) 1.0.0 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-01-20\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2019-12574", "mod_date": "2019-07-16", "pub_date": "2019-07-11", "cvss": 9.3, "cwe_code": 426, "cwe_name": " Untrusted Search Path", "summary": "a vulnerability in the london trust media private internet access (pia) vpn client v1.0 for windows could allow an authenticated, local attacker to run arbitrary code with elevated privileges. the pia client is vulnerable to a dll injection vulnerability during the software update process. the updater loads several libraries from a folder that authenticated users have write access to. a low privileged user can leverage this vulnerability to execute arbitrary code as system.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Untrusted Search Path." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 426:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Untrusted Search Path\n- Summary: a vulnerability in the london trust media private internet access (pia) vpn client v1.0 for windows could allow an authenticated, local attacker to run arbitrary code with elevated privileges. the pia client is vulnerable to a dll injection vulnerability during the software update process. the updater loads several libraries from a folder that authenticated users have write access to. a low privileged user can leverage this vulnerability to execute arbitrary code as system.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-07-11\n- Last Modified Date: 2019-07-16" } ] }, { "Unnamed: 0": "CVE-2010-4735", "mod_date": "2011-02-16", "pub_date": "2011-02-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in shoppingcart.asp in ecommercemax solutions digital-goods seller (dgs) 1.5 allows remote attackers to execute arbitrary sql commands via the d parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in shoppingcart.asp in ecommercemax solutions digital-goods seller (dgs) 1.5 allows remote attackers to execute arbitrary sql commands via the d parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-02-16\n- Last Modified Date: 2011-02-16" } ] }, { "Unnamed: 0": "CVE-2018-14058", "mod_date": "2018-10-12", "pub_date": "2018-08-17", "cvss": 4.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "pimcore before 5.3.0 allows sql injection via the rest web service api.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: pimcore before 5.3.0 allows sql injection via the rest web service api.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2018-08-17\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2018-11193", "mod_date": "2019-10-03", "pub_date": "2018-06-02", "cvss": 9.0, "cwe_code": 732, "cwe_name": " Incorrect Permission Assignment for Critical Resource", "summary": "quest dr series disk backup software version before 4.0.3.1 allows privilege escalation (issue 5 of 6).", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 732:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.0\n- CWE Name: Incorrect Permission Assignment for Critical Resource\n- Summary: quest dr series disk backup software version before 4.0.3.1 allows privilege escalation (issue 5 of 6).\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-06-02\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2012-2236", "mod_date": "2012-04-20", "pub_date": "2012-04-20", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in users.php in php gift registry 1.5.5 allows remote authenticated users to execute arbitrary sql commands via the userid parameter in an edit action.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in users.php in php gift registry 1.5.5 allows remote authenticated users to execute arbitrary sql commands via the userid parameter in an edit action.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-04-20\n- Last Modified Date: 2012-04-20" } ] }, { "Unnamed: 0": "CVE-2017-17822", "mod_date": "2018-01-03", "pub_date": "2017-12-21", "cvss": 4.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the list users api of piwigo 2.9.2 is vulnerable to sql injection via the /admin/user_list_backend.php ssortdir_0 parameter. an attacker can exploit this to gain access to the data in a connected mysql database.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the list users api of piwigo 2.9.2 is vulnerable to sql injection via the /admin/user_list_backend.php ssortdir_0 parameter. an attacker can exploit this to gain access to the data in a connected mysql database.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-12-21\n- Last Modified Date: 2018-01-03" } ] }, { "Unnamed: 0": "CVE-2019-0986", "mod_date": "2019-06-13", "pub_date": "2019-06-12", "cvss": 3.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists when the windows user profile service (profsvc) improperly handles symlinks, aka 'windows user profile service elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists when the windows user profile service (profsvc) improperly handles symlinks, aka 'windows user profile service elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/PARTIAL\n- Published Date: 2019-06-12\n- Last Modified Date: 2019-06-13" } ] }, { "Unnamed: 0": "CVE-2018-3880", "mod_date": "2018-10-29", "pub_date": "2018-08-23", "cvss": 9.0, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "an exploitable stack-based buffer overflow vulnerability exists in the database 'find-by-cameraid' functionality of video-core's http server of samsung smartthings hub sth-eth-250 - firmware version 0.20.17. the video-core process incorrectly handles existing records inside its sqlite database, leading to a buffer overflow on the stack. an attacker can send an http request to trigger this vulnerability.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 9.0\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: an exploitable stack-based buffer overflow vulnerability exists in the database 'find-by-cameraid' functionality of video-core's http server of samsung smartthings hub sth-eth-250 - firmware version 0.20.17. the video-core process incorrectly handles existing records inside its sqlite database, leading to a buffer overflow on the stack. an attacker can send an http request to trigger this vulnerability.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-08-23\n- Last Modified Date: 2018-10-29" } ] }, { "Unnamed: 0": "CVE-2017-16846", "mod_date": "2018-08-07", "pub_date": "2017-11-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "zoho manageengine applications manager 13 before build 13530 allows sql injection via the /manageapplications.do?method=addsubgroup haid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: zoho manageengine applications manager 13 before build 13530 allows sql injection via the /manageapplications.do?method=addsubgroup haid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-11-16\n- Last Modified Date: 2018-08-07" } ] }, { "Unnamed: 0": "CVE-2016-6790", "mod_date": "2017-01-18", "pub_date": "2017-01-12", "cvss": 9.3, "cwe_code": 284, "cwe_name": " Improper Access Control", "summary": "an elevation of privilege vulnerability in the nvidia libomx library (libnvomx) could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: kernel-3.18. android id: a-31251628. references: n-cve-2016-6790.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Access Control." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 284:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Access Control\n- Summary: an elevation of privilege vulnerability in the nvidia libomx library (libnvomx) could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: kernel-3.18. android id: a-31251628. references: n-cve-2016-6790.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-01-12\n- Last Modified Date: 2017-01-18" } ] }, { "Unnamed: 0": "CVE-2008-6618", "mod_date": "2018-10-11", "pub_date": "2009-04-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in classsystem 2.3 allow remote attackers to execute arbitrary sql commands via the teacher_id parameter in (1) class/homepagemain.php and (2) class/homepagetop.php, and (3) the message_id parameter in class/messagereply.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in classsystem 2.3 allow remote attackers to execute arbitrary sql commands via the teacher_id parameter in (1) class/homepagemain.php and (2) class/homepagetop.php, and (3) the message_id parameter in class/messagereply.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-06\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2016-8929", "mod_date": "2017-02-07", "pub_date": "2017-02-01", "cvss": 5.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "ibm kenexa lms on cloud is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ibm kenexa lms on cloud is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/PARTIAL\n- Published Date: 2017-02-01\n- Last Modified Date: 2017-02-07" } ] }, { "Unnamed: 0": "CVE-2012-2962", "mod_date": "2018-03-12", "pub_date": "2012-07-30", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in d4d/statusfilter.php in plixer scrutinizer (aka dell sonicwall scrutinizer) before 9.5.2 allows remote authenticated users to execute arbitrary sql commands via the q parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in d4d/statusfilter.php in plixer scrutinizer (aka dell sonicwall scrutinizer) before 9.5.2 allows remote authenticated users to execute arbitrary sql commands via the q parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-07-30\n- Last Modified Date: 2018-03-12" } ] }, { "Unnamed: 0": "CVE-2010-1225", "mod_date": "2018-10-10", "pub_date": "2010-04-01", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the memory-management implementation in the virtual machine monitor (aka vmm or hypervisor) in microsoft virtual pc 2007 gold and sp1, virtual server 2005 gold and r2 sp1, and windows virtual pc does not properly restrict access from the guest os to memory locations in the vmm work area, which allows context-dependent attackers to bypass certain anti-exploitation protection mechanisms on the guest os via crafted input to a vulnerable application. note: the vendor reportedly found that only systems with an otherwise vulnerable application are affected, because \"the memory areas accessible from the guest cannot be leveraged to achieve either remote code execution or elevation of privilege and ... no data from the host is exposed to the guest os.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the memory-management implementation in the virtual machine monitor (aka vmm or hypervisor) in microsoft virtual pc 2007 gold and sp1, virtual server 2005 gold and r2 sp1, and windows virtual pc does not properly restrict access from the guest os to memory locations in the vmm work area, which allows context-dependent attackers to bypass certain anti-exploitation protection mechanisms on the guest os via crafted input to a vulnerable application. note: the vendor reportedly found that only systems with an otherwise vulnerable application are affected, because \"the memory areas accessible from the guest cannot be leveraged to achieve either remote code execution or elevation of privilege and ... no data from the host is exposed to the guest os.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2010-04-01\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2018-12240", "mod_date": "2019-10-03", "pub_date": "2018-08-29", "cvss": 4.3, "cwe_code": 798, "cwe_name": " Use of Hard-coded Credentials", "summary": "the norton identity safe product prior to 5.3.0.976 may be susceptible to a privilege escalation issue via a hard coded iv, which is a type of vulnerability that can potentially increase the likelihood of encrypted data being recovered without adequate credentials.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Use of Hard-coded Credentials." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 798:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.3\n- CWE Name: Use of Hard-coded Credentials\n- Summary: the norton identity safe product prior to 5.3.0.976 may be susceptible to a privilege escalation issue via a hard coded iv, which is a type of vulnerability that can potentially increase the likelihood of encrypted data being recovered without adequate credentials.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2018-08-29\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2009-4571", "mod_date": "2018-10-10", "pub_date": "2010-01-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in index.php in phpshop 0.8.1 allow remote attackers to execute arbitrary sql commands via the (1) module_id parameter in an admin/function_list action, the (2) vendor_id parameter in a vendor/vendor_form action, the (3) module_id parameter in an admin/module_form action, the (4) user_id parameter in an admin/user_form action, the (5) vendor_category_id parameter in a vendor/vendor_category_form action, the (6) user_id parameter in a store/user_form action, the (7) payment_method_id parameter in a store/payment_method_form action, the (8) tax_rate_id parameter in a tax/tax_form action, or the (9) category parameter in a shop/browse action. note: the product_id vector is already covered by cve-2008-0681.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in index.php in phpshop 0.8.1 allow remote attackers to execute arbitrary sql commands via the (1) module_id parameter in an admin/function_list action, the (2) vendor_id parameter in a vendor/vendor_form action, the (3) module_id parameter in an admin/module_form action, the (4) user_id parameter in an admin/user_form action, the (5) vendor_category_id parameter in a vendor/vendor_category_form action, the (6) user_id parameter in a store/user_form action, the (7) payment_method_id parameter in a store/payment_method_form action, the (8) tax_rate_id parameter in a tax/tax_form action, or the (9) category parameter in a shop/browse action. note: the product_id vector is already covered by cve-2008-0681.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-05\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2017-11631", "mod_date": "2017-07-31", "pub_date": "2017-07-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "dapur/app/app_user/controller/status.php in fiyo cms 2.0.7 has sql injection via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: dapur/app/app_user/controller/status.php in fiyo cms 2.0.7 has sql injection via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-07-26\n- Last Modified Date: 2017-07-31" } ] }, { "Unnamed: 0": "CVE-2007-3909", "mod_date": "2017-07-29", "pub_date": "2007-07-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in bandersnatch 0.4 allow remote attackers to execute arbitrary sql commands via the (1) date and (2) limit parameters to index.php, and other unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in bandersnatch 0.4 allow remote attackers to execute arbitrary sql commands via the (1) date and (2) limit parameters to index.php, and other unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-07-19\n- Last Modified Date: 2017-07-29" } ] }, { "Unnamed: 0": "CVE-2009-4950", "mod_date": "2010-07-23", "pub_date": "2010-07-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the a21glossary advanced output (a21glossary_advanced_output) extension before 0.1.12 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the a21glossary advanced output (a21glossary_advanced_output) extension before 0.1.12 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-22\n- Last Modified Date: 2010-07-23" } ] }, { "Unnamed: 0": "CVE-2012-6525", "mod_date": "2017-08-29", "pub_date": "2013-01-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in members.php in phpbridges allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in members.php in phpbridges allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-01-31\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2017-0332", "mod_date": "2019-10-03", "pub_date": "2017-04-05", "cvss": 7.6, "cwe_code": 787, "cwe_name": " Out-of-bounds Write", "summary": "an elevation of privilege vulnerability in the nvidia crypto driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel 3.10. android id: a-33812508. references: n-cve-2017-0332.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Out-of-bounds Write." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 787:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Out-of-bounds Write\n- Summary: an elevation of privilege vulnerability in the nvidia crypto driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel 3.10. android id: a-33812508. references: n-cve-2017-0332.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-04-05\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-11774", "mod_date": "2019-08-07", "pub_date": "2019-07-29", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "apache vcl versions 2.1 through 2.5 do not properly validate form input when adding and removing vms to and from hosts. the form data is then used in sql statements. this allows for an sql injection attack. access to this portion of a vcl system requires admin level rights. other layers of security seem to protect against malicious attack. however, all vcl systems running versions earlier than 2.5.1 should be upgraded or patched. this vulnerability was found and reported to the apache vcl project by adlab of venustech.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: apache vcl versions 2.1 through 2.5 do not properly validate form input when adding and removing vms to and from hosts. the form data is then used in sql statements. this allows for an sql injection attack. access to this portion of a vcl system requires admin level rights. other layers of security seem to protect against malicious attack. however, all vcl systems running versions earlier than 2.5.1 should be upgraded or patched. this vulnerability was found and reported to the apache vcl project by adlab of venustech.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-07-29\n- Last Modified Date: 2019-08-07" } ] }, { "Unnamed: 0": "CVE-2008-5489", "mod_date": "2017-09-29", "pub_date": "2008-12-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in channel_detail.php in clipshare pro 4, and 2006 through 2007, allows remote attackers to execute arbitrary sql commands via the chid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in channel_detail.php in clipshare pro 4, and 2006 through 2007, allows remote attackers to execute arbitrary sql commands via the chid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-12\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2013-7175", "mod_date": "2016-12-31", "pub_date": "2014-01-24", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in avanset visual certexam manager 3.3 and earlier allow remote authenticated users to execute arbitrary sql commands via the (1) title, (2) file name, or (3) candidate name field.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in avanset visual certexam manager 3.3 and earlier allow remote authenticated users to execute arbitrary sql commands via the (1) title, (2) file name, or (3) candidate name field.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-01-24\n- Last Modified Date: 2016-12-31" } ] }, { "Unnamed: 0": "CVE-2017-7628", "mod_date": "2017-04-20", "pub_date": "2017-04-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the \"smart related articles\" extension 1.1 for joomla! has sql injection in dialog.php (attacker must use search_cats variable in post method to exploit this vulnerability).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the \"smart related articles\" extension 1.1 for joomla! has sql injection in dialog.php (attacker must use search_cats variable in post method to exploit this vulnerability).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-04-13\n- Last Modified Date: 2017-04-20" } ] }, { "Unnamed: 0": "CVE-2009-4595", "mod_date": "2010-01-13", "pub_date": "2010-01-12", "cvss": 6.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in php inventory 1.2 allows remote authenticated users to execute arbitrary sql commands via the sup_id parameter in a suppliers details action. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in php inventory 1.2 allows remote authenticated users to execute arbitrary sql commands via the sup_id parameter in a suppliers details action. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-12\n- Last Modified Date: 2010-01-13" } ] }, { "Unnamed: 0": "CVE-2016-2355", "mod_date": "2016-12-23", "pub_date": "2016-12-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the rest api in dotcms before 3.3.2 allows remote attackers to execute arbitrary sql commands via the stname parameter to api/content/save/1.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the rest api in dotcms before 3.3.2 allows remote attackers to execute arbitrary sql commands via the stname parameter to api/content/save/1.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-12-19\n- Last Modified Date: 2016-12-23" } ] }, { "Unnamed: 0": "CVE-2009-4591", "mod_date": "2017-08-17", "pub_date": "2010-01-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in basic analysis and security engine (base) before 1.4.4 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in basic analysis and security engine (base) before 1.4.4 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-07\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2016-10949", "mod_date": "2019-09-16", "pub_date": "2019-09-13", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the relevanssi premium plugin before 1.14.6.1 for wordpress has sql injection with resultant unsafe unserialization.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the relevanssi premium plugin before 1.14.6.1 for wordpress has sql injection with resultant unsafe unserialization.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-13\n- Last Modified Date: 2019-09-16" } ] }, { "Unnamed: 0": "CVE-2014-4123", "mod_date": "2018-10-12", "pub_date": "2014-10-15", "cvss": 6.8, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft internet explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka \"internet explorer elevation of privilege vulnerability,\" as exploited in the wild in october 2014, a different vulnerability than cve-2014-4124.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft internet explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka \"internet explorer elevation of privilege vulnerability,\" as exploited in the wild in october 2014, a different vulnerability than cve-2014-4124.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-10-15\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2019-11678", "mod_date": "2019-05-03", "pub_date": "2019-05-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the \"default reports\" feature in zoho manageengine firewall analyzer before 12.3 build 123218 is vulnerable to sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the \"default reports\" feature in zoho manageengine firewall analyzer before 12.3 build 123218 is vulnerable to sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-05-02\n- Last Modified Date: 2019-05-03" } ] }, { "Unnamed: 0": "CVE-2013-1284", "mod_date": "2018-10-12", "pub_date": "2013-04-09", "cvss": 4.9, "cwe_code": 362, "cwe_name": " Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", "summary": "race condition in the kernel in microsoft windows 8, windows server 2012, and windows rt allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka \"kernel race condition vulnerability.\" per: http://technet.microsoft.com/en-us/security/bulletin/ms13-031\r\n\r\n\"what might an attacker use the vulnerability to do? \r\nan attacker who successfully exploited this vulnerability could gain elevated privileges and read arbitrary amounts of kernel memory.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "COMPLETE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 362:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.9\n- CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\n- Summary: race condition in the kernel in microsoft windows 8, windows server 2012, and windows rt allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka \"kernel race condition vulnerability.\" per: http://technet.microsoft.com/en-us/security/bulletin/ms13-031\r\n\r\n\"what might an attacker use the vulnerability to do? \r\nan attacker who successfully exploited this vulnerability could gain elevated privileges and read arbitrary amounts of kernel memory.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/NONE/NONE\n- Published Date: 2013-04-09\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2004-1925", "mod_date": "2017-07-11", "pub_date": "2004-04-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in tiki cms/groupware (tikiwiki) 1.8.1 and earlier allow remote attackers to execute arbitrary sql commands via the sort_mode parameter in (1) tiki-usermenu.php, (2) tiki-list_file_gallery.php, (3) tiki-directory_ranking.php, (4) tiki-browse_categories.php, (5) tiki-index.php, (6) tiki-user_tasks.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-file_galleries.php, (10) tiki-list_faqs.php, (11) tiki-list_trackers.php, (12) tiki-list_blogs.php, or via the offset parameter in (13) tiki-usermenu.php, (14) tiki-browse_categories.php, (15) tiki-index.php, (16) tiki-user_tasks.php, (17) tiki-list_faqs.php, (18) tiki-list_trackers.php, or (19) tiki-list_blogs.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in tiki cms/groupware (tikiwiki) 1.8.1 and earlier allow remote attackers to execute arbitrary sql commands via the sort_mode parameter in (1) tiki-usermenu.php, (2) tiki-list_file_gallery.php, (3) tiki-directory_ranking.php, (4) tiki-browse_categories.php, (5) tiki-index.php, (6) tiki-user_tasks.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-file_galleries.php, (10) tiki-list_faqs.php, (11) tiki-list_trackers.php, (12) tiki-list_blogs.php, or via the offset parameter in (13) tiki-usermenu.php, (14) tiki-browse_categories.php, (15) tiki-index.php, (16) tiki-user_tasks.php, (17) tiki-list_faqs.php, (18) tiki-list_trackers.php, or (19) tiki-list_blogs.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2004-04-12\n- Last Modified Date: 2017-07-11" } ] }, { "Unnamed: 0": "CVE-2017-0769", "mod_date": "2019-10-03", "pub_date": "2017-09-08", "cvss": 9.3, "cwe_code": 404, "cwe_name": " Improper Resource Shutdown or Release", "summary": "a elevation of privilege vulnerability in the android media framework (libstagefright). product: android. versions: 7.0, 7.1.1, 7.1.2, 8.0. android id: a-37662122.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Resource Shutdown or Release." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 404:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Resource Shutdown or Release\n- Summary: a elevation of privilege vulnerability in the android media framework (libstagefright). product: android. versions: 7.0, 7.1.1, 7.1.2, 8.0. android id: a-37662122.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-09-08\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2010-4970", "mod_date": "2012-02-14", "pub_date": "2011-11-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in handlers/getpage.php in wiki web help 0.28 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in handlers/getpage.php in wiki web help 0.28 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-01\n- Last Modified Date: 2012-02-14" } ] }, { "Unnamed: 0": "CVE-2008-4377", "mod_date": "2017-09-29", "pub_date": "2008-10-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.asp in creative mind creator cms 5.0 allows remote attackers to execute arbitrary sql commands via the sideid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.asp in creative mind creator cms 5.0 allows remote attackers to execute arbitrary sql commands via the sideid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-01\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-16744", "mod_date": "2019-10-03", "pub_date": "2019-09-30", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "ebrigade before 5.0 has evenements.php cid sql injection.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ebrigade before 5.0 has evenements.php cid sql injection.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-30\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2014-6241", "mod_date": "2017-09-08", "pub_date": "2014-09-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the wt_directory extension before 1.4.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the wt_directory extension before 1.4.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-09-11\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2019-15016", "mod_date": "2019-10-11", "pub_date": "2019-10-09", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an sql injection vulnerability exists in the management interface of zingbox inspector versions 1.288 and earlier, that allows for unsanitized data provided by an authenticated user to be passed from the web ui into the database.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an sql injection vulnerability exists in the management interface of zingbox inspector versions 1.288 and earlier, that allows for unsanitized data provided by an authenticated user to be passed from the web ui into the database.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-09\n- Last Modified Date: 2019-10-11" } ] }, { "Unnamed: 0": "CVE-2016-10007", "mod_date": "2018-03-05", "pub_date": "2018-02-19", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the \"marketing > forms\" screen in dotcms before 3.7.2 and 4.x before 4.1.1 allows remote authenticated administrators to execute arbitrary sql commands via the _ext_form_handler_orderby parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the \"marketing > forms\" screen in dotcms before 3.7.2 and 4.x before 4.1.1 allows remote authenticated administrators to execute arbitrary sql commands via the _ext_form_handler_orderby parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-19\n- Last Modified Date: 2018-03-05" } ] }, { "Unnamed: 0": "CVE-2016-1218", "mod_date": "2017-04-25", "pub_date": "2017-04-20", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in cybozu garoon before 4.2.2.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in cybozu garoon before 4.2.2.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-04-20\n- Last Modified Date: 2017-04-25" } ] }, { "Unnamed: 0": "CVE-2019-1382", "mod_date": "2019-11-12", "pub_date": "2019-11-12", "cvss": 2.1, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists when activex installer service may allow access to files without proper authentication, aka 'microsoft activex installer service elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 2.1\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists when activex installer service may allow access to files without proper authentication, aka 'microsoft activex installer service elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-12\n- Last Modified Date: 2019-11-12" } ] }, { "Unnamed: 0": "CVE-2008-5000", "mod_date": "2017-09-29", "pub_date": "2008-11-10", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/includes/news.inc.php in phpx 3.5.16, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via uppercase characters in the news_id parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/includes/news.inc.php in phpx 3.5.16, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via uppercase characters in the news_id parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-10\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-2532", "mod_date": "2017-09-29", "pub_date": "2008-06-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in forum/topic_detail.php in aj square aj-hyip (aka aj hyip acme) allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in forum/topic_detail.php in aj square aj-hyip (aka aj hyip acme) allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-03\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2015-6350", "mod_date": "2016-12-07", "pub_date": "2015-10-30", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the web framework in cisco prime service catalog 11.0 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscuw50843.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the web framework in cisco prime service catalog 11.0 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscuw50843.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-10-30\n- Last Modified Date: 2016-12-07" } ] }, { "Unnamed: 0": "CVE-2018-14633", "mod_date": "2018-11-27", "pub_date": "2018-09-25", "cvss": 8.3, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "a security flaw was found in the chap_server_compute_md5() function in the iscsi target code in the linux kernel in a way an authentication request from an iscsi initiator is processed. an unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. the attack requires the iscsi target to be enabled on the victim host. depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iscsi target. due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 8.3\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: a security flaw was found in the chap_server_compute_md5() function in the iscsi target code in the linux kernel in a way an authentication request from an iscsi initiator is processed. an unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. the attack requires the iscsi target to be enabled on the victim host. depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iscsi target. due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/COMPLETE\n- Published Date: 2018-09-25\n- Last Modified Date: 2018-11-27" } ] }, { "Unnamed: 0": "CVE-2017-0546", "mod_date": "2019-10-03", "pub_date": "2017-04-07", "cvss": 9.3, "cwe_code": 476, "cwe_name": " NULL Pointer Dereference", "summary": "an elevation of privilege vulnerability in surfaceflinger could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-32628763.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: NULL Pointer Dereference." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 476:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: NULL Pointer Dereference\n- Summary: an elevation of privilege vulnerability in surfaceflinger could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as high because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-32628763.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-04-07\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2017-18260", "mod_date": "2018-05-16", "pub_date": "2018-04-11", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "dolibarr erp/crm is affected by multiple sql injection vulnerabilities in versions through 7.0.0 via comm/propal/list.php (viewstatut parameter) or comm/propal/list.php (propal_statut parameter, aka search_statut parameter).", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: dolibarr erp/crm is affected by multiple sql injection vulnerabilities in versions through 7.0.0 via comm/propal/list.php (viewstatut parameter) or comm/propal/list.php (propal_statut parameter, aka search_statut parameter).\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-04-11\n- Last Modified Date: 2018-05-16" } ] }, { "Unnamed: 0": "CVE-2018-0916", "mod_date": "2019-10-03", "pub_date": "2018-03-14", "cvss": 6.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "microsoft project server 2013 sp1 and microsoft sharepoint enterprise server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka \"microsoft sharepoint elevation of privilege vulnerability\". this cve is unique from cve-2018-0909, cve-2018-0910. cve-2018-0911, cve-2018-0912, cve-2018-0913 cve-2018-0914, cve-2018-0915, cve-2018-0917, cve-2018-0921, cve-2018-0923, cve-2018-0944 and cve-2018-0947.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: microsoft project server 2013 sp1 and microsoft sharepoint enterprise server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka \"microsoft sharepoint elevation of privilege vulnerability\". this cve is unique from cve-2018-0909, cve-2018-0910. cve-2018-0911, cve-2018-0912, cve-2018-0913 cve-2018-0914, cve-2018-0915, cve-2018-0917, cve-2018-0921, cve-2018-0923, cve-2018-0944 and cve-2018-0947.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-03-14\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-13050", "mod_date": "2018-08-30", "pub_date": "2018-07-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability exists in zoho manageengine applications manager 13.x before build 13800 via the j_username parameter in a /j_security_check post request.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability exists in zoho manageengine applications manager 13.x before build 13800 via the j_username parameter in a /j_security_check post request.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-07-02\n- Last Modified Date: 2018-08-30" } ] }, { "Unnamed: 0": "CVE-2017-17824", "mod_date": "2018-01-03", "pub_date": "2017-12-21", "cvss": 4.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the batch manager component of piwigo 2.9.2 is vulnerable to sql injection via the admin/batch_manager_unit.php element_ids parameter in unit mode. an attacker can exploit this to gain access to the data in a connected mysql database.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the batch manager component of piwigo 2.9.2 is vulnerable to sql injection via the admin/batch_manager_unit.php element_ids parameter in unit mode. an attacker can exploit this to gain access to the data in a connected mysql database.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-12-21\n- Last Modified Date: 2018-01-03" } ] }, { "Unnamed: 0": "CVE-2015-9353", "mod_date": "2019-09-09", "pub_date": "2019-08-28", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the gigpress plugin before 2.3.11 for wordpress has sql injection in the admin area, a different vulnerability than cve-2015-4066.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the gigpress plugin before 2.3.11 for wordpress has sql injection in the admin area, a different vulnerability than cve-2015-4066.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-28\n- Last Modified Date: 2019-09-09" } ] }, { "Unnamed: 0": "CVE-2009-4351", "mod_date": "2018-10-10", "pub_date": "2009-12-17", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/loginaction.php in wscreator 1.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the email (aka username) parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/loginaction.php in wscreator 1.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the email (aka username) parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-12-17\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2008-2125", "mod_date": "2017-09-29", "pub_date": "2008-05-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in viewalbums.php in musicbox 2.3.6 and 2.3.7 allows remote attackers to execute arbitrary sql commands via the artistid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in viewalbums.php in musicbox 2.3.6 and 2.3.7 allows remote attackers to execute arbitrary sql commands via the artistid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-09\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-11470", "mod_date": "2017-07-24", "pub_date": "2017-07-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "idera uptime monitor 7.8 has sql injection in /gadgets/definitions/uptime.capacitywhatifgadget/getxenmetrics.php via the element parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: idera uptime monitor 7.8 has sql injection in /gadgets/definitions/uptime.capacitywhatifgadget/getxenmetrics.php via the element parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-07-20\n- Last Modified Date: 2017-07-24" } ] }, { "Unnamed: 0": "CVE-2008-3785", "mod_date": "2017-09-29", "pub_date": "2008-08-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the com_content component in miacms 4.6.5 allow remote attackers to execute arbitrary sql commands via the id parameter in a (1) view, (2) category, or (3) blogsection action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the com_content component in miacms 4.6.5 allow remote attackers to execute arbitrary sql commands via the id parameter in a (1) view, (2) category, or (3) blogsection action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-08-26\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-6778", "mod_date": "2017-01-19", "pub_date": "2017-01-12", "cvss": 7.6, "cwe_code": 284, "cwe_name": " Improper Access Control", "summary": "an elevation of privilege vulnerability in the htc sound codec driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31384646.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Access Control." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 284:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Improper Access Control\n- Summary: an elevation of privilege vulnerability in the htc sound codec driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31384646.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-01-12\n- Last Modified Date: 2017-01-19" } ] }, { "Unnamed: 0": "CVE-2015-9326", "mod_date": "2019-08-21", "pub_date": "2019-08-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the wp-business-intelligence-lite plugin before 1.6.3 for wordpress has sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the wp-business-intelligence-lite plugin before 1.6.3 for wordpress has sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-16\n- Last Modified Date: 2019-08-21" } ] }, { "Unnamed: 0": "CVE-2011-4448", "mod_date": "2012-09-06", "pub_date": "2012-09-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in actions/usersettings/usersettings.php in wikkawiki 1.3.1 and 1.3.2 allows remote attackers to execute arbitrary sql commands via the default_comment_display parameter in an update action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in actions/usersettings/usersettings.php in wikkawiki 1.3.1 and 1.3.2 allows remote attackers to execute arbitrary sql commands via the default_comment_display parameter in an update action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-09-05\n- Last Modified Date: 2012-09-06" } ] }, { "Unnamed: 0": "CVE-2018-5696", "mod_date": "2018-02-01", "pub_date": "2018-01-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the ijoomla com_adagency plugin 6.0.9 for joomla! allows sql injection via the `advertiser_status` and `status_select` parameters to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the ijoomla com_adagency plugin 6.0.9 for joomla! allows sql injection via the `advertiser_status` and `status_select` parameters to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-14\n- Last Modified Date: 2018-02-01" } ] }, { "Unnamed: 0": "CVE-2017-15880", "mod_date": "2017-11-14", "pub_date": "2017-10-24", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability vulnerability in the eyesofnetwork web interface (aka eonweb) 5.1-0 allows remote authenticated administrators to execute arbitrary sql commands via the group_name parameter to module/admin_group/add_modify_group.php (for insert_group and update_group).", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability vulnerability in the eyesofnetwork web interface (aka eonweb) 5.1-0 allows remote authenticated administrators to execute arbitrary sql commands via the group_name parameter to module/admin_group/add_modify_group.php (for insert_group and update_group).\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-24\n- Last Modified Date: 2017-11-14" } ] }, { "Unnamed: 0": "CVE-2006-1018", "mod_date": "2018-10-18", "pub_date": "2006-03-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in poems.php in dci-designs dawaween 1.03 allows remote attackers to execute arbitrary sql commands via the id parameter in a diwan view action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in poems.php in dci-designs dawaween 1.03 allows remote attackers to execute arbitrary sql commands via the id parameter in a diwan view action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-03-07\n- Last Modified Date: 2018-10-18" } ] }, { "Unnamed: 0": "CVE-2015-0580", "mod_date": "2017-09-08", "pub_date": "2015-02-12", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the acs view reporting interface pages in cisco secure access control system (acs) before 5.5 patch 7 allow remote authenticated administrators to execute arbitrary sql commands via crafted https requests, aka bug id cscuq79027.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the acs view reporting interface pages in cisco secure access control system (acs) before 5.5 patch 7 allow remote authenticated administrators to execute arbitrary sql commands via crafted https requests, aka bug id cscuq79027.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-02-12\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2019-15573", "mod_date": "2019-09-03", "pub_date": "2019-08-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "gesior-aac before 2019-05-01 allows sql injection in tankyou.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: gesior-aac before 2019-05-01 allows sql injection in tankyou.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-26\n- Last Modified Date: 2019-09-03" } ] }, { "Unnamed: 0": "CVE-2011-4725", "mod_date": "2019-04-22", "pub_date": "2011-12-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the server administration panel in parallels plesk panel 10.2.0_build1011110331.18 allow remote attackers to execute arbitrary sql commands via crafted input to a php script, as demonstrated by login_up.php3 and certain other files.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the server administration panel in parallels plesk panel 10.2.0_build1011110331.18 allow remote attackers to execute arbitrary sql commands via crafted input to a php script, as demonstrated by login_up.php3 and certain other files.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-12-16\n- Last Modified Date: 2019-04-22" } ] }, { "Unnamed: 0": "CVE-2008-1465", "mod_date": "2017-09-29", "pub_date": "2008-03-24", "cvss": 9.3, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the detodas restaurante (com_restaurante) 1.0 component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php, a different product than cve-2008-0562.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 9.3\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the detodas restaurante (com_restaurante) 1.0 component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php, a different product than cve-2008-0562.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2008-03-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-8159", "mod_date": "2019-10-03", "pub_date": "2018-05-09", "cvss": 5.8, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "an elevation of privilege vulnerability exists when microsoft exchange outlook web access (owa) fails to properly handle web requests, aka \"microsoft exchange elevation of privilege vulnerability.\" this affects microsoft exchange server.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 5.8\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: an elevation of privilege vulnerability exists when microsoft exchange outlook web access (owa) fails to properly handle web requests, aka \"microsoft exchange elevation of privilege vulnerability.\" this affects microsoft exchange server.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/NONE\n- Published Date: 2018-05-09\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2006-3823", "mod_date": "2015-09-01", "pub_date": "2006-07-25", "cvss": 5.1, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in geodesicsolutions (1) geoauctions premier 2.0.3 and (2) geoclassifieds basic 2.0.3 allows remote attackers to execute arbitrary sql commands via the b parameter. successful exploitation requires that the 'accumulative feedback' feature is turned on.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.1\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in geodesicsolutions (1) geoauctions premier 2.0.3 and (2) geoclassifieds basic 2.0.3 allows remote attackers to execute arbitrary sql commands via the b parameter. successful exploitation requires that the 'accumulative feedback' feature is turned on.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-07-25\n- Last Modified Date: 2015-09-01" } ] }, { "Unnamed: 0": "CVE-2014-1636", "mod_date": "2018-10-30", "pub_date": "2014-01-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in command school student management system 1.06.01 allow remote attackers to execute arbitrary sql commands via the id parameter in an edit action to (1) admin_school_names.php, (2) admin_subjects.php, (3) admin_grades.php, (4) admin_terms.php, (5) admin_school_years.php, (6) admin_sgrades.php, (7) admin_media_codes_1.php, (8) admin_infraction_codes.php, (9) admin_generations.php, (10) admin_relations.php, (11) admin_titles.php, or (12) health_allergies.php in sw/.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in command school student management system 1.06.01 allow remote attackers to execute arbitrary sql commands via the id parameter in an edit action to (1) admin_school_names.php, (2) admin_subjects.php, (3) admin_grades.php, (4) admin_terms.php, (5) admin_school_years.php, (6) admin_sgrades.php, (7) admin_media_codes_1.php, (8) admin_infraction_codes.php, (9) admin_generations.php, (10) admin_relations.php, (11) admin_titles.php, or (12) health_allergies.php in sw/.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-01-22\n- Last Modified Date: 2018-10-30" } ] }, { "Unnamed: 0": "CVE-2019-3632", "mod_date": "2019-10-09", "pub_date": "2019-06-27", "cvss": 6.5, "cwe_code": 22, "cwe_name": " Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "summary": "directory traversal vulnerability in mcafee enterprise security manager (esm) prior to 11.2.0 and prior to 10.4.0 allows authenticated user to gain elevated privileges via specially crafted input.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 22:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\n- Summary: directory traversal vulnerability in mcafee enterprise security manager (esm) prior to 11.2.0 and prior to 10.4.0 allows authenticated user to gain elevated privileges via specially crafted input.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-06-27\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2017-6991", "mod_date": "2017-07-08", "pub_date": "2017-05-22", "cvss": 6.8, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "an issue was discovered in certain apple products. ios before 10.3.2 is affected. macos before 10.12.5 is affected. the issue involves the \"sqlite\" component. it allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: an issue was discovered in certain apple products. ios before 10.3.2 is affected. macos before 10.12.5 is affected. the issue involves the \"sqlite\" component. it allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-05-22\n- Last Modified Date: 2017-07-08" } ] }, { "Unnamed: 0": "CVE-2018-18018", "mod_date": "2019-04-16", "pub_date": "2019-04-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the tribulant slideshow gallery plugin 1.6.8 for wordpress via the wp-admin/admin.php?page=slideshow-galleries&method=save gallery[id] or gallery[title] parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the tribulant slideshow gallery plugin 1.6.8 for wordpress via the wp-admin/admin.php?page=slideshow-galleries&method=save gallery[id] or gallery[title] parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-04-15\n- Last Modified Date: 2019-04-16" } ] }, { "Unnamed: 0": "CVE-2011-3408", "mod_date": "2019-02-26", "pub_date": "2011-12-14", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "csrsrv.dll in the client/server run-time subsystem (aka csrss) in the win32 subsystem in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2, r2, and r2 sp1, and windows 7 gold and sp1 does not properly check permissions for sending inter-process device-event messages from low-integrity processes to high-integrity processes, which allows local users to gain privileges via a crafted application, aka \"csrss local privilege elevation vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: csrsrv.dll in the client/server run-time subsystem (aka csrss) in the win32 subsystem in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2, r2, and r2 sp1, and windows 7 gold and sp1 does not properly check permissions for sending inter-process device-event messages from low-integrity processes to high-integrity processes, which allows local users to gain privileges via a crafted application, aka \"csrss local privilege elevation vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2011-12-14\n- Last Modified Date: 2019-02-26" } ] }, { "Unnamed: 0": "CVE-2012-2718", "mod_date": "2017-08-29", "pub_date": "2012-06-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the counter module for drupal allows remote attackers to execute arbitrary sql commands via unspecified vectors related to \"recording visits.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the counter module for drupal allows remote attackers to execute arbitrary sql commands via unspecified vectors related to \"recording visits.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-06-21\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2018-17446", "mod_date": "2018-12-04", "pub_date": "2018-10-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection issue was discovered in citrix sd-wan 10.1.0 and netscaler sd-wan 9.3.x before 9.3.6 and 10.0.x before 10.0.4.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection issue was discovered in citrix sd-wan 10.1.0 and netscaler sd-wan 9.3.x before 9.3.6 and 10.0.x before 10.0.4.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-10-23\n- Last Modified Date: 2018-12-04" } ] }, { "Unnamed: 0": "CVE-2016-8009", "mod_date": "2017-03-27", "pub_date": "2017-03-14", "cvss": 4.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "privilege escalation vulnerability in intel security mcafee application control (mac) 7.0 and 6.x versions allows attackers to cause dos, unexpected behavior, or potentially unauthorized code execution via an unauthorized use of ioctl call.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: privilege escalation vulnerability in intel security mcafee application control (mac) 7.0 and 6.x versions allows attackers to cause dos, unexpected behavior, or potentially unauthorized code execution via an unauthorized use of ioctl call.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-03-14\n- Last Modified Date: 2017-03-27" } ] }, { "Unnamed: 0": "CVE-2015-9466", "mod_date": "2019-10-17", "pub_date": "2019-10-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the wti-like-post plugin before 1.4.3 for wordpress has wtilikepostprocessvote sql injection via the http_client_ip, http_x_forwarded_for, http_x_forwarded, http_forwarded_for, or http_forwarded variable.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the wti-like-post plugin before 1.4.3 for wordpress has wtilikepostprocessvote sql injection via the http_client_ip, http_x_forwarded_for, http_x_forwarded, http_forwarded_for, or http_forwarded variable.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-10\n- Last Modified Date: 2019-10-17" } ] }, { "Unnamed: 0": "CVE-2017-13225", "mod_date": "2018-01-25", "pub_date": "2018-01-12", "cvss": 9.3, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "in libmtkomxvdec.so there is a possible heap buffer overflow. this could lead to a remote elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android kernel. android id: a-38308024. references: m-alps03495789.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: in libmtkomxvdec.so there is a possible heap buffer overflow. this could lead to a remote elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android kernel. android id: a-38308024. references: m-alps03495789.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-01-12\n- Last Modified Date: 2018-01-25" } ] }, { "Unnamed: 0": "CVE-2019-9087", "mod_date": "2019-07-01", "pub_date": "2019-06-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "hoteldruid before v2.3.1 has sql injection via the /tab_tariffe.php numtariffa1 parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: hoteldruid before v2.3.1 has sql injection via the /tab_tariffe.php numtariffa1 parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-06-07\n- Last Modified Date: 2019-07-01" } ] }, { "Unnamed: 0": "CVE-2006-6349", "mod_date": "2018-10-17", "pub_date": "2006-12-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in pwp technologies the classified ad system allow remote attackers to execute arbitrary sql commands via (1) the main parameter in a view action (includes/mainpage/view.asp) in default.asp or (2) a query in the search engine.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in pwp technologies the classified ad system allow remote attackers to execute arbitrary sql commands via (1) the main parameter in a view action (includes/mainpage/view.asp) in default.asp or (2) a query in the search engine.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-12-07\n- Last Modified Date: 2018-10-17" } ] }, { "Unnamed: 0": "CVE-2018-11535", "mod_date": "2018-06-29", "pub_date": "2018-05-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in sitemakin slac (site login and access control) v1.0. the parameter \"my_item_search\" in users.php is exploitable using sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in sitemakin slac (site login and access control) v1.0. the parameter \"my_item_search\" in users.php is exploitable using sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-29\n- Last Modified Date: 2018-06-29" } ] }, { "Unnamed: 0": "CVE-2008-1351", "mod_date": "2017-09-29", "pub_date": "2008-03-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the tutorials 2.1b module for xoops allows remote attackers to execute arbitrary sql commands via the tid parameter to printpage.php, which is accessible directly or through a printpage action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the tutorials 2.1b module for xoops allows remote attackers to execute arbitrary sql commands via the tid parameter to printpage.php, which is accessible directly or through a printpage action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-5578", "mod_date": "2017-09-29", "pub_date": "2008-12-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in index.php in scssboard 1.0, 1.1, 1.11, and 1.12 allow remote attackers to execute arbitrary sql commands via (1) the f parameter in a showforum action, (2) the u parameter in a profile action, (3) the viewcat parameter, or (4) a combination of scb_uid and scb_ident cookie values.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in index.php in scssboard 1.0, 1.1, 1.11, and 1.12 allow remote attackers to execute arbitrary sql commands via (1) the f parameter in a showforum action, (2) the u parameter in a profile action, (3) the viewcat parameter, or (4) a combination of scb_uid and scb_ident cookie values.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-15\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-2484", "mod_date": "2017-09-29", "pub_date": "2008-05-28", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in xomol cms 1.20071213, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the email parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in xomol cms 1.20071213, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the email parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-28\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-2898", "mod_date": "2018-10-16", "pub_date": "2007-05-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in includes/rating.php in 2z project 0.9.5 allows remote attackers to execute arbitrary sql commands via the rating parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in includes/rating.php in 2z project 0.9.5 allows remote attackers to execute arbitrary sql commands via the rating parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-05-30\n- Last Modified Date: 2018-10-16" } ] }, { "Unnamed: 0": "CVE-2017-14252", "mod_date": "2017-09-18", "pub_date": "2017-09-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the eyesofnetwork web interface (aka eonweb) 5.1-0 via the group_id cookie to side.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the eyesofnetwork web interface (aka eonweb) 5.1-0 via the group_id cookie to side.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-09-11\n- Last Modified Date: 2017-09-18" } ] }, { "Unnamed: 0": "CVE-2008-5844", "mod_date": "2009-05-14", "pub_date": "2009-01-05", "cvss": 7.5, "cwe_code": 16, "cwe_name": " Configuration", "summary": "php 5.2.7 contains an incorrect change to the filter_unsafe_raw functionality, and unintentionally disables magic_quotes_gpc regardless of the actual magic_quotes_gpc setting, which might make it easier for context-dependent attackers to conduct sql injection attacks and unspecified other attacks.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Configuration." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 16:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Configuration\n- Summary: php 5.2.7 contains an incorrect change to the filter_unsafe_raw functionality, and unintentionally disables magic_quotes_gpc regardless of the actual magic_quotes_gpc setting, which might make it easier for context-dependent attackers to conduct sql injection attacks and unspecified other attacks.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-05\n- Last Modified Date: 2009-05-14" } ] }, { "Unnamed: 0": "CVE-2015-8369", "mod_date": "2016-12-07", "pub_date": "2015-12-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in include/top_graph_header.php in cacti 0.8.8f and earlier allows remote attackers to execute arbitrary sql commands via the rra_id parameter in a properties action to graph.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in include/top_graph_header.php in cacti 0.8.8f and earlier allows remote attackers to execute arbitrary sql commands via the rra_id parameter in a properties action to graph.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-12-17\n- Last Modified Date: 2016-12-07" } ] }, { "Unnamed: 0": "CVE-2008-3212", "mod_date": "2017-08-08", "pub_date": "2008-07-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in scripteen free image hosting script 1.2.1 allow remote attackers to execute arbitrary sql commands via the (1) username or (2) password parameter to admin/login.php, or the (3) uname or (4) pass parameter to login.php. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in scripteen free image hosting script 1.2.1 allow remote attackers to execute arbitrary sql commands via the (1) username or (2) password parameter to admin/login.php, or the (3) uname or (4) pass parameter to login.php. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-18\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2010-1070", "mod_date": "2017-08-17", "pub_date": "2010-03-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in imagoscripts deviant art clone allows remote attackers to execute arbitrary sql commands via the seid parameter in a forums viewcat action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in imagoscripts deviant art clone allows remote attackers to execute arbitrary sql commands via the seid parameter in a forums viewcat action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-23\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2012-5333", "mod_date": "2017-08-29", "pub_date": "2012-10-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in page.php in pre printing press allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in page.php in pre printing press allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-10-08\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2015-9244", "mod_date": "2019-10-09", "pub_date": "2018-05-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "keys of objects in mysql node module v2.0.0-alpha7 and earlier are not escaped with `mysql.escape()` which could lead to sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: keys of objects in mysql node module v2.0.0-alpha7 and earlier are not escaped with `mysql.escape()` which could lead to sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-29\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2019-6295", "mod_date": "2019-01-18", "pub_date": "2019-01-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "cleanto 5.0 has sql injection via the assets/lib/service_method_ajax.php service_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: cleanto 5.0 has sql injection via the assets/lib/service_method_ajax.php service_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-01-15\n- Last Modified Date: 2019-01-18" } ] }, { "Unnamed: 0": "CVE-2008-2995", "mod_date": "2018-10-11", "pub_date": "2008-07-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in phpeasydata 1.5.4 allow remote attackers to execute arbitrary sql commands via (1) the annuaire parameter to annuaire.php or (2) the username field in admin/login.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in phpeasydata 1.5.4 allow remote attackers to execute arbitrary sql commands via (1) the annuaire parameter to annuaire.php or (2) the username field in admin/login.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-03\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2012-2171", "mod_date": "2017-08-29", "pub_date": "2012-06-22", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in moduleservlet.do in the storage manager profiler in ibm system storage ds storage manager before 10.83.xx.18 on ds series devices allows remote authenticated users to execute arbitrary sql commands via the selectedmoduleonly parameter in a state_viewmodulelog action to the moduleservlet uri.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in moduleservlet.do in the storage manager profiler in ibm system storage ds storage manager before 10.83.xx.18 on ds series devices allows remote authenticated users to execute arbitrary sql commands via the selectedmoduleonly parameter in a state_viewmodulelog action to the moduleservlet uri.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-06-22\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2010-4632", "mod_date": "2010-12-31", "pub_date": "2010-12-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in aspilot pilot cart 7.3 allow remote attackers to execute arbitrary sql commands via the (1) article parameter to kb.asp, (2) specific parameter to cart.asp, (3) countrycode parameter to contact.asp, and the (4) srch parameter to search.asp. note: the article parameter to pilot.asp is already covered by cve-2008-2688.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in aspilot pilot cart 7.3 allow remote attackers to execute arbitrary sql commands via the (1) article parameter to kb.asp, (2) specific parameter to cart.asp, (3) countrycode parameter to contact.asp, and the (4) srch parameter to search.asp. note: the article parameter to pilot.asp is already covered by cve-2008-2688.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-12-30\n- Last Modified Date: 2010-12-31" } ] }, { "Unnamed: 0": "CVE-2017-17597", "mod_date": "2017-12-22", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "nearbuy clone script 3.2 has sql injection via the category_list.php search parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: nearbuy clone script 3.2 has sql injection via the category_list.php search parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-22" } ] }, { "Unnamed: 0": "CVE-2008-6030", "mod_date": "2017-09-29", "pub_date": "2009-02-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in netartmedia jobs portal 1.3 allow remote attackers to execute arbitrary sql commands via (1) the job parameter to index.php in the search module or (2) the news_id parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in netartmedia jobs portal 1.3 allow remote attackers to execute arbitrary sql commands via (1) the job parameter to index.php in the search module or (2) the news_id parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-03\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-18792", "mod_date": "2018-12-04", "pub_date": "2018-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in zzcms 8.3. sql injection exists in zs/zs_list.php via a pxzs cookie.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in zzcms 8.3. sql injection exists in zs/zs_list.php via a pxzs cookie.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-10-29\n- Last Modified Date: 2018-12-04" } ] }, { "Unnamed: 0": "CVE-2008-5958", "mod_date": "2017-09-29", "pub_date": "2009-01-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in active test 2.1 allow remote attackers to execute arbitrary sql commands via the quizid parameter to (1) questions.asp, (2) importquestions.asp, and (3) quiztakers.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in active test 2.1 allow remote attackers to execute arbitrary sql commands via the quizid parameter to (1) questions.asp, (2) importquestions.asp, and (3) quiztakers.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-23\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-2515", "mod_date": "2010-06-29", "pub_date": "2010-06-28", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in index.php in the jfaq (com_jfaq) component 1.2 for joomla!, when magic_quotes_gpc is disabled, allow (1) remote attackers to execute arbitrary sql commands via the id parameter, and (2) remote authenticated users with \"public front-end\" permissions to execute arbitrary sql commands via the titlu parameter (title field). note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in index.php in the jfaq (com_jfaq) component 1.2 for joomla!, when magic_quotes_gpc is disabled, allow (1) remote attackers to execute arbitrary sql commands via the id parameter, and (2) remote authenticated users with \"public front-end\" permissions to execute arbitrary sql commands via the titlu parameter (title field). note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-06-28\n- Last Modified Date: 2010-06-29" } ] }, { "Unnamed: 0": "CVE-2007-6556", "mod_date": "2017-09-29", "pub_date": "2007-12-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in websihirbazi 5.1.1 allow remote attackers to execute arbitrary sql commands via (1) the id parameter to default.asp in a news page action or (2) the pageid parameter to default.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in websihirbazi 5.1.1 allow remote attackers to execute arbitrary sql commands via (1) the id parameter to default.asp in a news page action or (2) the pageid parameter to default.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-12-28\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-20173", "mod_date": "2019-01-04", "pub_date": "2018-12-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "zoho manageengine opmanager 12.3 before 123238 allows sql injection via the getgraphdata api.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: zoho manageengine opmanager 12.3 before 123238 allows sql injection via the getgraphdata api.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-12-17\n- Last Modified Date: 2019-01-04" } ] }, { "Unnamed: 0": "CVE-2018-19553", "mod_date": "2018-12-18", "pub_date": "2018-11-26", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "interspire email marketer through 6.1.6 has sql injection via an updateblock sortorder request to dynamiccontenttags.php", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: interspire email marketer through 6.1.6 has sql injection via an updateblock sortorder request to dynamiccontenttags.php\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-11-26\n- Last Modified Date: 2018-12-18" } ] }, { "Unnamed: 0": "CVE-2017-17608", "mod_date": "2017-12-26", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "child care script 1.0 has sql injection via the /list city parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: child care script 1.0 has sql injection via the /list city parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-26" } ] }, { "Unnamed: 0": "CVE-2011-1717", "mod_date": "2011-05-11", "pub_date": "2011-04-18", "cvss": 2.1, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "skype for android stores sensitive user data without encryption in sqlite3 databases that have weak permissions, which allows local applications to read user ids, contacts, phone numbers, date of birth, instant message logs, and other private information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 2.1\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: skype for android stores sensitive user data without encryption in sqlite3 databases that have weak permissions, which allows local applications to read user ids, contacts, phone numbers, date of birth, instant message logs, and other private information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2011-04-18\n- Last Modified Date: 2011-05-11" } ] }, { "Unnamed: 0": "CVE-2017-8126", "mod_date": "2019-10-03", "pub_date": "2017-11-22", "cvss": 7.5, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "the uma product with software v200r001 has a privilege elevation vulnerability due to insufficient validation or improper processing of parameters. an attacker could craft specific packets to exploit these vulnerabilities to gain elevated privileges.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.5\n- CWE Name: Improper Input Validation\n- Summary: the uma product with software v200r001 has a privilege elevation vulnerability due to insufficient validation or improper processing of parameters. an attacker could craft specific packets to exploit these vulnerabilities to gain elevated privileges.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-11-22\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2017-14187", "mod_date": "2019-10-03", "pub_date": "2018-05-24", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "a local privilege escalation and local code execution vulnerability in fortinet fortios 5.6.0 to 5.6.2, 5.4.0 to 5.4.8, and 5.2 and below versions allows attacker to execute unauthorized binary program contained on an usb drive plugged into a fortigate via linking the aforementioned binary program to a command that is allowed to be run by the fnsysctl cli command.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: a local privilege escalation and local code execution vulnerability in fortinet fortios 5.6.0 to 5.6.2, 5.4.0 to 5.4.8, and 5.2 and below versions allows attacker to execute unauthorized binary program contained on an usb drive plugged into a fortigate via linking the aforementioned binary program to a command that is allowed to be run by the fnsysctl cli command.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-05-24\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2008-3377", "mod_date": "2017-09-29", "pub_date": "2008-07-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in picture.php in phptest 0.6.3 allows remote attackers to execute arbitrary sql commands via the image_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in picture.php in phptest 0.6.3 allows remote attackers to execute arbitrary sql commands via the image_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-30\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2015-2503", "mod_date": "2018-10-12", "pub_date": "2015-11-11", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft access 2007 sp3, excel 2007 sp3, infopath 2007 sp3, onenote 2007 sp3, powerpoint 2007 sp3, project 2007 sp3, publisher 2007 sp3, visio 2007 sp3, word 2007 sp3, office 2007 ime (japanese) sp3, access 2010 sp2, excel 2010 sp2, infopath 2010 sp2, onenote 2010 sp2, powerpoint 2010 sp2, project 2010 sp2, publisher 2010 sp2, visio 2010 sp2, word 2010 sp2, pinyin ime 2010, access 2013 sp1, excel 2013 sp1, infopath 2013 sp1, onenote 2013 sp1, powerpoint 2013 sp1, project 2013 sp1, publisher 2013 sp1, visio 2013 sp1, word 2013 sp1, excel 2013 rt sp1, onenote 2013 rt sp1, powerpoint 2013 rt sp1, word 2013 rt sp1, access 2016, excel 2016, onenote 2016, powerpoint 2016, project 2016, publisher 2016, visio 2016, word 2016, skype for business 2016, and lync 2013 sp1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with internet explorer, as demonstrated by a transition from low integrity to medium integrity, aka \"microsoft office elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft access 2007 sp3, excel 2007 sp3, infopath 2007 sp3, onenote 2007 sp3, powerpoint 2007 sp3, project 2007 sp3, publisher 2007 sp3, visio 2007 sp3, word 2007 sp3, office 2007 ime (japanese) sp3, access 2010 sp2, excel 2010 sp2, infopath 2010 sp2, onenote 2010 sp2, powerpoint 2010 sp2, project 2010 sp2, publisher 2010 sp2, visio 2010 sp2, word 2010 sp2, pinyin ime 2010, access 2013 sp1, excel 2013 sp1, infopath 2013 sp1, onenote 2013 sp1, powerpoint 2013 sp1, project 2013 sp1, publisher 2013 sp1, visio 2013 sp1, word 2013 sp1, excel 2013 rt sp1, onenote 2013 rt sp1, powerpoint 2013 rt sp1, word 2013 rt sp1, access 2016, excel 2016, onenote 2016, powerpoint 2016, project 2016, publisher 2016, visio 2016, word 2016, skype for business 2016, and lync 2013 sp1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with internet explorer, as demonstrated by a transition from low integrity to medium integrity, aka \"microsoft office elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-11-11\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2019-7588", "mod_date": "2019-10-10", "pub_date": "2019-06-18", "cvss": 6.9, "cwe_code": 285, "cwe_name": " Improper Authorization", "summary": "a vulnerability in the exacqvision enterprise system manager (esm) v5.12.2 application whereby unauthorized privilege escalation can potentially be achieved. this vulnerability impacts exacqvision esm v5.12.2 and all prior versions of esm running on a windows operating system. this issue does not impact any windows server oss, or linux deployments with permissions that are not inherited from the root directory. authorized users have ?modify? permission to the esm folders, which allows a low privilege account to modify files located in these directories. an executable can be renamed and replaced by a malicious file that could connect back to a bad actor providing system level privileges. a low privileged user is not able to restart the service, but a restart of the system would trigger the execution of the malicious file. this issue affects: exacq technologies, inc. exacqvision enterprise system manager (esm) version 5.12.2 and prior versions; this issue does not affect: exacq technologies, inc. exacqvision enterprise system manager (esm) 19.03 and above.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Authorization." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 285:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Improper Authorization\n- Summary: a vulnerability in the exacqvision enterprise system manager (esm) v5.12.2 application whereby unauthorized privilege escalation can potentially be achieved. this vulnerability impacts exacqvision esm v5.12.2 and all prior versions of esm running on a windows operating system. this issue does not impact any windows server oss, or linux deployments with permissions that are not inherited from the root directory. authorized users have ?modify? permission to the esm folders, which allows a low privilege account to modify files located in these directories. an executable can be renamed and replaced by a malicious file that could connect back to a bad actor providing system level privileges. a low privileged user is not able to restart the service, but a restart of the system would trigger the execution of the malicious file. this issue affects: exacq technologies, inc. exacqvision enterprise system manager (esm) version 5.12.2 and prior versions; this issue does not affect: exacq technologies, inc. exacqvision enterprise system manager (esm) 19.03 and above.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-06-18\n- Last Modified Date: 2019-10-10" } ] }, { "Unnamed: 0": "CVE-2010-0722", "mod_date": "2017-08-17", "pub_date": "2010-02-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in news.php in php auktion pro allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in news.php in php auktion pro allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-02-26\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2014-3932", "mod_date": "2014-06-03", "pub_date": "2014-06-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the device registration component in wsf/webservice.php in cososys endpoint protector 4 4.3.0.4 and 4.4.0.2 allows remote attackers to execute arbitrary sql commands via unspecified parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the device registration component in wsf/webservice.php in cososys endpoint protector 4 4.3.0.4 and 4.4.0.2 allows remote attackers to execute arbitrary sql commands via unspecified parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-06-02\n- Last Modified Date: 2014-06-03" } ] }, { "Unnamed: 0": "CVE-2005-4315", "mod_date": "2011-03-07", "pub_date": "2005-12-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the search function in plexum plexcart x3 allows remote attackers to execute arbitrary sql commands via unspecified vectors, possibly involving the (1) s_itemname and (2) s_orderby parameters to plexcart.pl.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the search function in plexum plexcart x3 allows remote attackers to execute arbitrary sql commands via unspecified vectors, possibly involving the (1) s_itemname and (2) s_orderby parameters to plexcart.pl.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-12-17\n- Last Modified Date: 2011-03-07" } ] }, { "Unnamed: 0": "CVE-2008-6086", "mod_date": "2017-09-29", "pub_date": "2009-02-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in album.php in camera life 2.6.2b4 allows remote attackers to execute arbitrary sql commands via the id parameter, a different vector than cve-2008-3355.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in album.php in camera life 2.6.2b4 allows remote attackers to execute arbitrary sql commands via the id parameter, a different vector than cve-2008-3355.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-6595", "mod_date": "2017-08-17", "pub_date": "2009-04-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the pmk_rssnewsexport extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the pmk_rssnewsexport extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-03\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2019-9083", "mod_date": "2019-03-25", "pub_date": "2019-03-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sqlitemanager 1.20 and 1.24 allows sql injection via the /sqlitemanager/main.php dbsel parameter. note: this product is discontinued.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sqlitemanager 1.20 and 1.24 allows sql injection via the /sqlitemanager/main.php dbsel parameter. note: this product is discontinued.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-03-21\n- Last Modified Date: 2019-03-25" } ] }, { "Unnamed: 0": "CVE-2016-8479", "mod_date": "2017-07-17", "pub_date": "2017-03-08", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the qualcomm gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31824853. references: qc-cr#1093687.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the qualcomm gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31824853. references: qc-cr#1093687.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-03-08\n- Last Modified Date: 2017-07-17" } ] }, { "Unnamed: 0": "CVE-2017-17895", "mod_date": "2018-01-09", "pub_date": "2017-12-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "readymade job site script has sql injection via the location_name array parameter to the /job uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: readymade job site script has sql injection via the location_name array parameter to the /job uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-27\n- Last Modified Date: 2018-01-09" } ] }, { "Unnamed: 0": "CVE-2008-1308", "mod_date": "2019-07-01", "pub_date": "2008-03-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the sudirman angriawan nukec30 3.0 module for php-nuke allows remote attackers to execute arbitrary sql commands via the id_catg parameter in a viewcatg action to modules.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the sudirman angriawan nukec30 3.0 module for php-nuke allows remote attackers to execute arbitrary sql commands via the id_catg parameter in a viewcatg action to modules.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-12\n- Last Modified Date: 2019-07-01" } ] }, { "Unnamed: 0": "CVE-2010-4614", "mod_date": "2010-12-30", "pub_date": "2010-12-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in item.php in ero auktion 2010 allows remote attackers to execute arbitrary sql commands via the id parameter, a different vector than cve-2010-0723.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in item.php in ero auktion 2010 allows remote attackers to execute arbitrary sql commands via the id parameter, a different vector than cve-2010-0723.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-12-29\n- Last Modified Date: 2010-12-30" } ] }, { "Unnamed: 0": "CVE-2016-8902", "mod_date": "2016-11-29", "pub_date": "2016-11-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the categoriesservlet servlet in dotcms before 3.3.1 allows remote not authenticated attackers to execute arbitrary sql commands via the sort parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the categoriesservlet servlet in dotcms before 3.3.1 allows remote not authenticated attackers to execute arbitrary sql commands via the sort parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-11-14\n- Last Modified Date: 2016-11-29" } ] }, { "Unnamed: 0": "CVE-2018-4041", "mod_date": "2019-01-16", "pub_date": "2019-01-10", "cvss": 6.6, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "an exploitable privilege escalation vulnerability exists in the helper service of clean my mac x, version 4.04, due to improper input validation. an attacker with local access could exploit this vulnerability to modify the file system as root.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "NONE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.6\n- CWE Name: Improper Input Validation\n- Summary: an exploitable privilege escalation vulnerability exists in the helper service of clean my mac x, version 4.04, due to improper input validation. an attacker with local access could exploit this vulnerability to modify the file system as root.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): NONE/COMPLETE/COMPLETE\n- Published Date: 2019-01-10\n- Last Modified Date: 2019-01-16" } ] }, { "Unnamed: 0": "CVE-2017-0666", "mod_date": "2019-10-03", "pub_date": "2017-07-06", "cvss": 9.3, "cwe_code": 682, "cwe_name": " Incorrect Calculation", "summary": "a elevation of privilege vulnerability in the android framework. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-37285689.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Calculation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 682:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Incorrect Calculation\n- Summary: a elevation of privilege vulnerability in the android framework. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-37285689.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-07-06\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2010-0796", "mod_date": "2017-08-17", "pub_date": "2010-03-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the je quiz (com_jequizmanagement) component 1.b01 for joomla! allows remote attackers to execute arbitrary sql commands via the eid parameter in a question action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the je quiz (com_jequizmanagement) component 1.b01 for joomla! allows remote attackers to execute arbitrary sql commands via the eid parameter in a question action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-02\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2019-16682", "mod_date": "2019-10-21", "pub_date": "2019-10-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the url_redirect (aka url redirect) extension through 1.2.1 for typo3 fails to properly sanitize user input and is susceptible to sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the url_redirect (aka url redirect) extension through 1.2.1 for typo3 fails to properly sanitize user input and is susceptible to sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-16\n- Last Modified Date: 2019-10-21" } ] }, { "Unnamed: 0": "CVE-2008-2489", "mod_date": "2017-08-08", "pub_date": "2008-05-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the library for frontend plugins (aka sg_zfelib) extension 1.1.512 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified \"user input.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the library for frontend plugins (aka sg_zfelib) extension 1.1.512 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified \"user input.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-28\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2008-0752", "mod_date": "2017-09-29", "pub_date": "2008-02-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the neogallery (com_neogallery) 1.1 component for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter in a show action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the neogallery (com_neogallery) 1.1 component for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter in a show action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-13\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-6338", "mod_date": "2018-10-15", "pub_date": "2007-12-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in userlogin.jsp in trivantis coursemill enterprise learning management system 4.1 sp4 allows remote attackers to execute arbitrary sql commands via the user parameter (username field). note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in userlogin.jsp in trivantis coursemill enterprise learning management system 4.1 sp4 allows remote attackers to execute arbitrary sql commands via the user parameter (username field). note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-12-15\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2010-0701", "mod_date": "2017-08-17", "pub_date": "2010-02-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in forcechangepassword.jsp in newgen software omnidocs allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in forcechangepassword.jsp in newgen software omnidocs allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-02-23\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2014-5458", "mod_date": "2015-11-02", "pub_date": "2014-08-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in sqrl_verify.php in php-sqrl allows remote attackers to execute arbitrary sql commands via the message parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in sqrl_verify.php in php-sqrl allows remote attackers to execute arbitrary sql commands via the message parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-08-25\n- Last Modified Date: 2015-11-02" } ] }, { "Unnamed: 0": "CVE-2019-10866", "mod_date": "2019-08-03", "pub_date": "2019-05-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "in the form maker plugin before 1.13.3 for wordpress, it's possible to achieve sql injection in the function get_labels_parameters in the file form-maker/admin/models/submissions_fm.php with a crafted value of the /models/submissioc parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: in the form maker plugin before 1.13.3 for wordpress, it's possible to achieve sql injection in the function get_labels_parameters in the file form-maker/admin/models/submissions_fm.php with a crafted value of the /models/submissioc parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-05-23\n- Last Modified Date: 2019-08-03" } ] }, { "Unnamed: 0": "CVE-2017-0296", "mod_date": "2019-10-03", "pub_date": "2017-06-15", "cvss": 7.2, "cwe_code": 120, "cwe_name": " Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", "summary": "microsoft windows 7 sp1, windows server 2008 sp2 and r2 sp1, windows 8.1 and windows rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allow an attacker to elevate privilege when tdx.sys fails to check the length of a buffer prior to copying memory to it, aka \"windows tdx elevation of privilege vulnerability\".", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 120:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')\n- Summary: microsoft windows 7 sp1, windows server 2008 sp2 and r2 sp1, windows 8.1 and windows rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allow an attacker to elevate privilege when tdx.sys fails to check the length of a buffer prior to copying memory to it, aka \"windows tdx elevation of privilege vulnerability\".\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-06-15\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-1515", "mod_date": "2019-10-09", "pub_date": "2018-05-25", "cvss": 4.4, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "ibm db2 for linux, unix and windows (includes db2 connect server) 10.5 and 11.1, under specific or unusual conditions, could allow a local user to overflow a buffer which may result in a privilege escalation to the db2 instance owner. ibm x-force id: 141624.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.4\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: ibm db2 for linux, unix and windows (includes db2 connect server) 10.5 and 11.1, under specific or unusual conditions, could allow a local user to overflow a buffer which may result in a privilege escalation to the db2 instance owner. ibm x-force id: 141624.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-05-25\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2013-6058", "mod_date": "2017-08-29", "pub_date": "2013-11-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in apprain cmf 3.0.2 and earlier allows remote attackers to execute arbitrary sql commands via the path_info to blog-by-cat/.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in apprain cmf 3.0.2 and earlier allows remote attackers to execute arbitrary sql commands via the path_info to blog-by-cat/.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-11-14\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-1872", "mod_date": "2017-09-29", "pub_date": "2008-04-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in home.news.php in comdev news publisher 4.1.2 allows remote attackers to execute arbitrary sql commands via the arcmonth parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in home.news.php in comdev news publisher 4.1.2 allows remote attackers to execute arbitrary sql commands via the arcmonth parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-4159", "mod_date": "2017-09-29", "pub_date": "2008-09-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in jaw portal and zanfi cms lite and allows remote attackers to execute arbitrary sql commands via the page (pageid) parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in jaw portal and zanfi cms lite and allows remote attackers to execute arbitrary sql commands via the page (pageid) parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-20925", "mod_date": "2019-08-12", "pub_date": "2019-08-01", "cvss": 4.6, "cwe_code": 434, "cwe_name": " Unrestricted Upload of File with Dangerous Type", "summary": "cpanel before 70.0.23 allows local privilege escalation via the whm legacy language file upload interface (sec-379).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Unrestricted Upload of File with Dangerous Type." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 434:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Unrestricted Upload of File with Dangerous Type\n- Summary: cpanel before 70.0.23 allows local privilege escalation via the whm legacy language file upload interface (sec-379).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-01\n- Last Modified Date: 2019-08-12" } ] }, { "Unnamed: 0": "CVE-2009-3665", "mod_date": "2018-10-10", "pub_date": "2009-10-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in index.php in nullam blog 0.1.2 allow remote attackers to execute arbitrary sql commands via the (1) i parameter or (2) v parameters in a register action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in index.php in nullam blog 0.1.2 allow remote attackers to execute arbitrary sql commands via the (1) i parameter or (2) v parameters in a register action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-10-11\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2010-4979", "mod_date": "2017-08-29", "pub_date": "2011-11-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in image/view.php in candid allows remote attackers to execute arbitrary sql commands via the image_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in image/view.php in candid allows remote attackers to execute arbitrary sql commands via the image_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-01\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2017-16735", "mod_date": "2018-01-04", "pub_date": "2017-12-20", "cvss": 5.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection issue was discovered in ecava integraxor v 6.1.1030.1 and prior. the sql injection vulnerability has been identified, which generates an error in the database log.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection issue was discovered in ecava integraxor v 6.1.1030.1 and prior. the sql injection vulnerability has been identified, which generates an error in the database log.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/PARTIAL\n- Published Date: 2017-12-20\n- Last Modified Date: 2018-01-04" } ] }, { "Unnamed: 0": "CVE-2019-12723", "mod_date": "2019-07-11", "pub_date": "2019-07-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in the teclib fields plugin through 1.9.2 for glpi. it allows sql injection via container_id and old_order parameters to ajax/reorder.php by an unauthenticated user.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in the teclib fields plugin through 1.9.2 for glpi. it allows sql injection via container_id and old_order parameters to ajax/reorder.php by an unauthenticated user.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-07-10\n- Last Modified Date: 2019-07-11" } ] }, { "Unnamed: 0": "CVE-2009-3644", "mod_date": "2009-10-12", "pub_date": "2009-10-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the soundset (com_soundset) component 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the cat_id parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the soundset (com_soundset) component 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the cat_id parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-10-09\n- Last Modified Date: 2009-10-12" } ] }, { "Unnamed: 0": "CVE-2016-0099", "mod_date": "2018-10-12", "pub_date": "2016-03-09", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the secondary logon service in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka \"secondary logon elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the secondary logon service in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka \"secondary logon elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-03-09\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2010-0973", "mod_date": "2017-08-17", "pub_date": "2010-03-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in phppool media domain verkaus and auktions portal allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in phppool media domain verkaus and auktions portal allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-16\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2016-8227", "mod_date": "2017-01-28", "pub_date": "2017-01-26", "cvss": 7.2, "cwe_code": 284, "cwe_name": " Improper Access Control", "summary": "privilege escalation vulnerability in lenovo transition application used in lenovo yoga, flex and miix systems running windows allows local users to execute code with elevated privileges.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Access Control." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 284:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Access Control\n- Summary: privilege escalation vulnerability in lenovo transition application used in lenovo yoga, flex and miix systems running windows allows local users to execute code with elevated privileges.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-01-26\n- Last Modified Date: 2017-01-28" } ] }, { "Unnamed: 0": "CVE-2014-8295", "mod_date": "2014-10-22", "pub_date": "2014-10-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in joblogs.php in bacula-web 5.2.10 allows remote attackers to execute arbitrary sql commands via the jobid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in joblogs.php in bacula-web 5.2.10 allows remote attackers to execute arbitrary sql commands via the jobid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-10-15\n- Last Modified Date: 2014-10-22" } ] }, { "Unnamed: 0": "CVE-2010-5039", "mod_date": "2017-08-29", "pub_date": "2011-11-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in control/admin_login.php in scriptsfeed recipes listing portal 1.0 allows remote attackers to execute arbitrary sql commands via the loginid parameter (aka the username field). note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in control/admin_login.php in scriptsfeed recipes listing portal 1.0 allows remote attackers to execute arbitrary sql commands via the loginid parameter (aka the username field). note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-02\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2015-1748", "mod_date": "2018-10-12", "pub_date": "2015-06-10", "cvss": 6.8, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft internet explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka \"internet explorer elevation of privilege vulnerability,\" a different vulnerability than cve-2015-1743.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft internet explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka \"internet explorer elevation of privilege vulnerability,\" a different vulnerability than cve-2015-1743.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-06-10\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2008-5641", "mod_date": "2017-09-29", "pub_date": "2008-12-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in account.asp in active photo gallery 6.2 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in account.asp in active photo gallery 6.2 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2014-9573", "mod_date": "2017-09-08", "pub_date": "2015-01-26", "cvss": 6.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in manage_user_page.php in mantisbt before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote administrators with file privileges to execute arbitrary sql commands via the mantis_manage_users_cookie cookie.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in manage_user_page.php in mantisbt before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote administrators with file privileges to execute arbitrary sql commands via the mantis_manage_users_cookie cookie.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-26\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2017-8377", "mod_date": "2017-05-10", "pub_date": "2017-05-01", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "genixcms 1.0.2 has sql injection in inc/lib/control/backend/menus.control.php via the menuid parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: genixcms 1.0.2 has sql injection in inc/lib/control/backend/menus.control.php via the menuid parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-05-01\n- Last Modified Date: 2017-05-10" } ] }, { "Unnamed: 0": "CVE-2008-6691", "mod_date": "2017-08-17", "pub_date": "2009-04-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in diocese of portsmouth calendar today (pd_calendar_today) extension 0.0.3 for typo3 allows remote attackers to execute arbitrary sql commands via unknown vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in diocese of portsmouth calendar today (pd_calendar_today) extension 0.0.3 for typo3 allows remote attackers to execute arbitrary sql commands via unknown vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-10\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2007-3273", "mod_date": "2012-10-24", "pub_date": "2007-06-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.cfm in fusetalk 2.0 allows remote attackers to execute arbitrary sql commands via unspecified vectors. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.cfm in fusetalk 2.0 allows remote attackers to execute arbitrary sql commands via unspecified vectors. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-06-19\n- Last Modified Date: 2012-10-24" } ] }, { "Unnamed: 0": "CVE-2012-4673", "mod_date": "2012-08-27", "pub_date": "2012-08-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in application/controllers/invoice.php in neoinvoice might allow remote attackers to execute arbitrary sql commands via vectors involving the sort_col variable in the list_items function, a different vulnerability than cve-2012-3477.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in application/controllers/invoice.php in neoinvoice might allow remote attackers to execute arbitrary sql commands via vectors involving the sort_col variable in the list_items function, a different vulnerability than cve-2012-3477.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-08-26\n- Last Modified Date: 2012-08-27" } ] }, { "Unnamed: 0": "CVE-2009-4698", "mod_date": "2017-09-19", "pub_date": "2010-03-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the qas (aka quas) module for xoops celepar allow remote attackers to execute arbitrary sql commands via the codigo parameter to (1) aviso.php and (2) imprimir.php, and the (3) cod_categoria parameter to categoria.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the qas (aka quas) module for xoops celepar allow remote attackers to execute arbitrary sql commands via the codigo parameter to (1) aviso.php and (2) imprimir.php, and the (3) cod_categoria parameter to categoria.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-15\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2017-9246", "mod_date": "2017-07-05", "pub_date": "2017-06-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "new relic .net agent before 6.3.123.0 adds sql injection flaws to safe applications via vectors involving failure to escape quotes during use of the slow queries feature, as demonstrated by a mishandled quote in a values clause of an insert statement, after bypassing a set showplan_all on protection mechanism.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: new relic .net agent before 6.3.123.0 adds sql injection flaws to safe applications via vectors involving failure to escape quotes during use of the slow queries feature, as demonstrated by a mishandled quote in a values clause of an insert statement, after bypassing a set showplan_all on protection mechanism.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-06-13\n- Last Modified Date: 2017-07-05" } ] }, { "Unnamed: 0": "CVE-2009-3326", "mod_date": "2017-09-19", "pub_date": "2009-09-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in cmscontrol content management system 7.x allows remote attackers to execute arbitrary sql commands via the id_menu parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in cmscontrol content management system 7.x allows remote attackers to execute arbitrary sql commands via the id_menu parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-23\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-5632", "mod_date": "2017-09-29", "pub_date": "2008-12-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in account.asp in active time billing 3.2 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters, possibly related to start.asp. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in account.asp in active time billing 3.2 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters, possibly related to start.asp. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-8613", "mod_date": "2019-10-03", "pub_date": "2017-06-29", "cvss": 6.8, "cwe_code": 640, "cwe_name": " Weak Password Recovery Mechanism for Forgotten Password", "summary": "azure ad connect password writeback, if misconfigured during enablement, allows an attacker to reset passwords and gain unauthorized access to arbitrary on-premises ad privileged user accounts aka \"azure ad connect elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Weak Password Recovery Mechanism for Forgotten Password." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 640:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Weak Password Recovery Mechanism for Forgotten Password\n- Summary: azure ad connect password writeback, if misconfigured during enablement, allows an attacker to reset passwords and gain unauthorized access to arbitrary on-premises ad privileged user accounts aka \"azure ad connect elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-06-29\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2009-3082", "mod_date": "2009-09-08", "pub_date": "2009-09-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in wcategory.php in snow hall silurus system 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in wcategory.php in snow hall silurus system 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-04\n- Last Modified Date: 2009-09-08" } ] }, { "Unnamed: 0": "CVE-2009-4702", "mod_date": "2010-03-16", "pub_date": "2010-03-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the tour extension (pm_tour) extension before 0.0.13 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the tour extension (pm_tour) extension before 0.0.13 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-15\n- Last Modified Date: 2010-03-16" } ] }, { "Unnamed: 0": "CVE-2010-2047", "mod_date": "2017-08-17", "pub_date": "2010-05-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in je cms 1.0.0 and 1.1 allows remote attackers to execute arbitrary sql commands via the categoryid parameter in a viewcategory action. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in je cms 1.0.0 and 1.1 allows remote attackers to execute arbitrary sql commands via the categoryid parameter in a viewcategory action. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-25\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2018-20621", "mod_date": "2019-10-03", "pub_date": "2019-03-13", "cvss": 7.2, "cwe_code": 732, "cwe_name": " Incorrect Permission Assignment for Critical Resource", "summary": "an issue was discovered in microvirt memu 6.0.6. the memuservice.exe service binary is vulnerable to local privilege escalation through binary planting due to insecure permissions set at install time. this allows code to be run as nt authority/system.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 732:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Incorrect Permission Assignment for Critical Resource\n- Summary: an issue was discovered in microvirt memu 6.0.6. the memuservice.exe service binary is vulnerable to local privilege escalation through binary planting due to insecure permissions set at install time. this allows code to be run as nt authority/system.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-03-13\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2008-1398", "mod_date": "2017-09-29", "pub_date": "2008-03-20", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in online.php in auracms 2.0 through 2.2.1 allows remote attackers to execute arbitrary sql commands via the x-forwarded-for field (http_x_forwarded_for environment variable) in an http header.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in online.php in auracms 2.0 through 2.2.1 allows remote attackers to execute arbitrary sql commands via the x-forwarded-for field (http_x_forwarded_for environment variable) in an http header.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-20\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-15933", "mod_date": "2017-11-14", "pub_date": "2017-10-27", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability vulnerability in the eyesofnetwork web interface (aka eonweb) 5.1-0 allows remote authenticated administrators to execute arbitrary sql commands via the host parameter to module/capacity_per_device/index.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability vulnerability in the eyesofnetwork web interface (aka eonweb) 5.1-0 allows remote authenticated administrators to execute arbitrary sql commands via the host parameter to module/capacity_per_device/index.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-27\n- Last Modified Date: 2017-11-14" } ] }, { "Unnamed: 0": "CVE-2016-3309", "mod_date": "2018-10-12", "pub_date": "2016-08-09", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel-mode drivers in microsoft windows vista sp2; windows server 2008 sp2 and r2 sp1; windows 7 sp1; windows 8.1; windows server 2012 gold and r2; windows rt 8.1; and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3308, cve-2016-3310, and cve-2016-3311.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel-mode drivers in microsoft windows vista sp2; windows server 2008 sp2 and r2 sp1; windows 7 sp1; windows 8.1; windows server 2012 gold and r2; windows rt 8.1; and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3308, cve-2016-3310, and cve-2016-3311.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-08-09\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2017-6578", "mod_date": "2019-03-19", "pub_date": "2017-03-09", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection issue is exploitable, with wordpress admin access, in the mail masta (aka mail-masta) plugin 1.0 for wordpress. this affects ./inc/subscriber_list.php with the post parameter: subscriber_email.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection issue is exploitable, with wordpress admin access, in the mail masta (aka mail-masta) plugin 1.0 for wordpress. this affects ./inc/subscriber_list.php with the post parameter: subscriber_email.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-03-09\n- Last Modified Date: 2019-03-19" } ] }, { "Unnamed: 0": "CVE-2014-9955", "mod_date": "2018-05-08", "pub_date": "2018-04-04", "cvss": 10.0, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in qualcomm closed source components. product: android. versions: android kernel. android id: a-36384686.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 10.0\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in qualcomm closed source components. product: android. versions: android kernel. android id: a-36384686.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-04-04\n- Last Modified Date: 2018-05-08" } ] }, { "Unnamed: 0": "CVE-2005-3877", "mod_date": "2012-02-07", "pub_date": "2005-11-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in simple document management system (sdms) 2.0-cvs and earlier allow remote attackers to execute arbitrary sql commands via the (1) folder_id parameter in list.php and (2) mid parameter in a view action to messages.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in simple document management system (sdms) 2.0-cvs and earlier allow remote attackers to execute arbitrary sql commands via the (1) folder_id parameter in list.php and (2) mid parameter in a view action to messages.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-11-29\n- Last Modified Date: 2012-02-07" } ] }, { "Unnamed: 0": "CVE-2012-5350", "mod_date": "2017-08-29", "pub_date": "2012-10-09", "cvss": 6.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the pay with tweet plugin before 1.2 for wordpress allows remote authenticated users with certain permissions to execute arbitrary sql commands via the id parameter in a paywithtweet shortcode.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the pay with tweet plugin before 1.2 for wordpress allows remote authenticated users with certain permissions to execute arbitrary sql commands via the id parameter in a paywithtweet shortcode.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-10-09\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2009-0339", "mod_date": "2018-10-11", "pub_date": "2009-01-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in inc_webblogmanager.asp in dmxready blog manager allows remote attackers to execute arbitrary sql commands via the itemid parameter in a view action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in inc_webblogmanager.asp in dmxready blog manager allows remote attackers to execute arbitrary sql commands via the itemid parameter in a view action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-29\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2016-7184", "mod_date": "2018-10-12", "pub_date": "2016-11-10", "cvss": 9.3, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "the common log file system (clfs) driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allows local users to gain privileges via a crafted application, aka \"windows common log file system driver elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0026, cve-2016-3332, cve-2016-3333, cve-2016-3334, cve-2016-3335, cve-2016-3338, cve-2016-3340, cve-2016-3342, and cve-2016-3343.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: the common log file system (clfs) driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allows local users to gain privileges via a crafted application, aka \"windows common log file system driver elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0026, cve-2016-3332, cve-2016-3333, cve-2016-3334, cve-2016-3335, cve-2016-3338, cve-2016-3340, cve-2016-3342, and cve-2016-3343.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-10\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2009-0106", "mod_date": "2017-10-19", "pub_date": "2009-01-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in profile.php in phpauctions (aka phpauctionsystem) allows remote attackers to execute arbitrary sql commands via the user_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in profile.php in phpauctions (aka phpauctionsystem) allows remote attackers to execute arbitrary sql commands via the user_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-09\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2017-17623", "mod_date": "2017-12-29", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "opensource classified ads script 3.2 has sql injection via the advance_result.php keyword parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: opensource classified ads script 3.2 has sql injection via the advance_result.php keyword parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-29" } ] }, { "Unnamed: 0": "CVE-2018-8399", "mod_date": "2019-10-03", "pub_date": "2018-08-15", "cvss": 6.9, "cwe_code": 404, "cwe_name": " Improper Resource Shutdown or Release", "summary": "an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability.\" this affects windows 10 servers, windows 10. this cve id is unique from cve-2018-8404.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Resource Shutdown or Release." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 404:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Improper Resource Shutdown or Release\n- Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability.\" this affects windows 10 servers, windows 10. this cve id is unique from cve-2018-8404.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-08-15\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2008-5954", "mod_date": "2017-08-08", "pub_date": "2009-01-23", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ktp computer customer database (ktpccd) cms, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the lname parameter in a login action to an unspecified component. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ktp computer customer database (ktpccd) cms, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the lname parameter in a login action to an unspecified component. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-23\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2017-0553", "mod_date": "2019-10-03", "pub_date": "2017-04-07", "cvss": 7.6, "cwe_code": 190, "cwe_name": " Integer Overflow or Wraparound", "summary": "an elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the wi-fi service. this issue is rated as moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. product: android. versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-32342065. note: this issue also exists in the upstream libnl before 3.3.0 library.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Integer Overflow or Wraparound." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 190:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Integer Overflow or Wraparound\n- Summary: an elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the wi-fi service. this issue is rated as moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. product: android. versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-32342065. note: this issue also exists in the upstream libnl before 3.3.0 library.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-04-07\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2017-17604", "mod_date": "2017-12-22", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "entrepreneur bus booking script 3.0.4 has sql injection via the booker_details.php sourcebus parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: entrepreneur bus booking script 3.0.4 has sql injection via the booker_details.php sourcebus parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-22" } ] }, { "Unnamed: 0": "CVE-2008-3055", "mod_date": "2017-08-08", "pub_date": "2008-07-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the support view (ext_tbl) extension 0.0.102 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the support view (ext_tbl) extension 0.0.102 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-07\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2015-0002", "mod_date": "2018-10-12", "pub_date": "2015-01-13", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the ahcverifyadmincontext function in ahcache.sys in the application compatibility component in microsoft windows 7 sp1, windows server 2008 r2 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 does not verify that an impersonation token is associated with an administrative account, which allows local users to gain privileges by running appcompatcache.exe with a crafted dll file, aka msrc id 20544 or \"microsoft application compatibility infrastructure elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the ahcverifyadmincontext function in ahcache.sys in the application compatibility component in microsoft windows 7 sp1, windows server 2008 r2 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 does not verify that an impersonation token is associated with an administrative account, which allows local users to gain privileges by running appcompatcache.exe with a crafted dll file, aka msrc id 20544 or \"microsoft application compatibility infrastructure elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-01-13\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2007-4952", "mod_date": "2017-09-29", "pub_date": "2007-09-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in article.php in omnistar article manager allows remote attackers to execute arbitrary sql commands via the page_id parameter in a favorite op action, a different vector than cve-2006-5917.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in article.php in omnistar article manager allows remote attackers to execute arbitrary sql commands via the page_id parameter in a favorite op action, a different vector than cve-2006-5917.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-09-18\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2015-2090", "mod_date": "2016-11-30", "pub_date": "2015-02-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the ajax_survey function in settings.php in the wordpress survey and poll plugin 1.1.7 for wordpress allows remote attackers to execute arbitrary sql commands via the survey_id parameter in an ajax_survey action to wp-admin/admin-ajax.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the ajax_survey function in settings.php in the wordpress survey and poll plugin 1.1.7 for wordpress allows remote attackers to execute arbitrary sql commands via the survey_id parameter in an ajax_survey action to wp-admin/admin-ajax.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-02-26\n- Last Modified Date: 2016-11-30" } ] }, { "Unnamed: 0": "CVE-2010-4799", "mod_date": "2017-08-17", "pub_date": "2011-04-27", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in chipmunk pwngame 1.0, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters to authenticate.php and the (3) id parameter to pwn.php. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in chipmunk pwngame 1.0, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters to authenticate.php and the (3) id parameter to pwn.php. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-04-27\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2008-1954", "mod_date": "2017-09-29", "pub_date": "2008-04-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in one_day.php in web calendar pro 4.1 and earlier allows remote attackers to execute arbitrary sql commands via the user_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in one_day.php in web calendar pro 4.1 and earlier allows remote attackers to execute arbitrary sql commands via the user_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-25\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-15904", "mod_date": "2018-11-09", "pub_date": "2018-08-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a10 acos web application firewall (waf) 2.7.1 and 2.7.2 before 2.7.2-p12, 4.1.0 before 4.1.0-p11, 4.1.1 before 4.1.1-p8, and 4.1.2 before 4.1.2-p4 mishandles the configured rules for blocking sql injection attacks, aka a10-2017-0008.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a10 acos web application firewall (waf) 2.7.1 and 2.7.2 before 2.7.2-p12, 4.1.0 before 4.1.0-p11, 4.1.1 before 4.1.1-p8, and 4.1.2 before 4.1.2-p4 mishandles the configured rules for blocking sql injection attacks, aka a10-2017-0008.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-08-27\n- Last Modified Date: 2018-11-09" } ] }, { "Unnamed: 0": "CVE-2019-1256", "mod_date": "2019-09-12", "pub_date": "2019-09-11", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-1285.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-1285.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-09-11\n- Last Modified Date: 2019-09-12" } ] }, { "Unnamed: 0": "CVE-2013-6869", "mod_date": "2018-12-10", "pub_date": "2013-11-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the srtt_get_count_before_key_rfc function in sap netweaver 7.30 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the srtt_get_count_before_key_rfc function in sap netweaver 7.30 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-11-23\n- Last Modified Date: 2018-12-10" } ] }, { "Unnamed: 0": "CVE-2019-0566", "mod_date": "2019-02-26", "pub_date": "2019-01-08", "cvss": 6.8, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists in microsoft edge browser broker com object, aka \"microsoft edge elevation of privilege vulnerability.\" this affects microsoft edge.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists in microsoft edge browser broker com object, aka \"microsoft edge elevation of privilege vulnerability.\" this affects microsoft edge.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-01-08\n- Last Modified Date: 2019-02-26" } ] }, { "Unnamed: 0": "CVE-2007-6083", "mod_date": "2018-10-15", "pub_date": "2007-11-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/index.php in icebb 1.0-rc6 allows remote attackers to execute arbitrary sql commands via the x-forwarded-for http header.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/index.php in icebb 1.0-rc6 allows remote attackers to execute arbitrary sql commands via the x-forwarded-for http header.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-11-22\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2012-4479", "mod_date": "2012-12-03", "pub_date": "2012-11-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the drag & drop gallery module 6.x for drupal allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the drag & drop gallery module 6.x for drupal allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-11-30\n- Last Modified Date: 2012-12-03" } ] }, { "Unnamed: 0": "CVE-2013-4461", "mod_date": "2014-01-14", "pub_date": "2013-12-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the web interface for cumin in red hat enterprise mrg grid 2.4 allows remote attackers to execute arbitrary sql commands via vectors related to the \"filtering table operator.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the web interface for cumin in red hat enterprise mrg grid 2.4 allows remote attackers to execute arbitrary sql commands via vectors related to the \"filtering table operator.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-12-23\n- Last Modified Date: 2014-01-14" } ] }, { "Unnamed: 0": "CVE-2019-11623", "mod_date": "2019-05-01", "pub_date": "2019-04-30", "cvss": 4.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "doorgets 7.0 has a sql injection vulnerability in /doorgets/app/requests/user/configurationrequest.php when action=siteweb. a remote background administrator privilege user (or a user with permission to manage configuration siteweb) could exploit the vulnerability to obtain database sensitive information.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: doorgets 7.0 has a sql injection vulnerability in /doorgets/app/requests/user/configurationrequest.php when action=siteweb. a remote background administrator privilege user (or a user with permission to manage configuration siteweb) could exploit the vulnerability to obtain database sensitive information.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2019-04-30\n- Last Modified Date: 2019-05-01" } ] }, { "Unnamed: 0": "CVE-2010-1044", "mod_date": "2017-08-17", "pub_date": "2010-03-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in login.do in manageengine oputils 5.0 allows remote attackers to execute arbitrary sql commands via the ishttpport parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in login.do in manageengine oputils 5.0 allows remote attackers to execute arbitrary sql commands via the ishttpport parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-23\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2019-17197", "mod_date": "2019-10-08", "pub_date": "2019-10-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "openemr through 5.0.2 has sql injection in the lifestyle demographic filter criteria in library/clinical_rules.php that affects library/patient.inc.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: openemr through 5.0.2 has sql injection in the lifestyle demographic filter criteria in library/clinical_rules.php that affects library/patient.inc.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-05\n- Last Modified Date: 2019-10-08" } ] }, { "Unnamed: 0": "CVE-2008-0802", "mod_date": "2017-09-29", "pub_date": "2008-02-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the mediaslide (com_mediaslide) 0.5 component for joomla! allows remote attackers to execute arbitrary sql commands via the albumnum parameter in a contact action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the mediaslide (com_mediaslide) 0.5 component for joomla! allows remote attackers to execute arbitrary sql commands via the albumnum parameter in a contact action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-15\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2013-3531", "mod_date": "2017-08-29", "pub_date": "2013-05-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in meneger.php in radiocms 2.2 allows remote attackers to execute arbitrary sql commands via the playlist_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in meneger.php in radiocms 2.2 allows remote attackers to execute arbitrary sql commands via the playlist_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-05-10\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2018-18790", "mod_date": "2018-12-04", "pub_date": "2018-10-29", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in zzcms 8.3. sql injection exists in admin/special_add.php via a zxbigclassid cookie. (this needs an admin user login.)", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in zzcms 8.3. sql injection exists in admin/special_add.php via a zxbigclassid cookie. (this needs an admin user login.)\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-10-29\n- Last Modified Date: 2018-12-04" } ] }, { "Unnamed: 0": "CVE-2018-12805", "mod_date": "2019-10-03", "pub_date": "2018-07-20", "cvss": 7.5, "cwe_code": 427, "cwe_name": " Uncontrolled Search Path Element", "summary": "adobe connect versions 9.7.5 and earlier have an insecure library loading vulnerability. successful exploitation could lead to privilege escalation.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Uncontrolled Search Path Element." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 427:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.5\n- CWE Name: Uncontrolled Search Path Element\n- Summary: adobe connect versions 9.7.5 and earlier have an insecure library loading vulnerability. successful exploitation could lead to privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-07-20\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2017-14380", "mod_date": "2019-10-03", "pub_date": "2017-12-13", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "in emc isilon onefs 8.1.0.0, 8.0.1.0 - 8.0.1.1, 8.0.0.0 - 8.0.0.4, 7.2.1.0 - 7.2.1.5, 7.2.0.x, and 7.1.1.x, a malicious compliance admin (compadmin) account user could exploit a vulnerability in isi_get_itrace or isi_get_profile maintenance scripts to run any shell script as system root on a cluster in compliance mode. this could potentially lead to an elevation of privilege for the compadmin user and violate compliance mode.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: in emc isilon onefs 8.1.0.0, 8.0.1.0 - 8.0.1.1, 8.0.0.0 - 8.0.0.4, 7.2.1.0 - 7.2.1.5, 7.2.0.x, and 7.1.1.x, a malicious compliance admin (compadmin) account user could exploit a vulnerability in isi_get_itrace or isi_get_profile maintenance scripts to run any shell script as system root on a cluster in compliance mode. this could potentially lead to an elevation of privilege for the compadmin user and violate compliance mode.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-12-13\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-3667", "mod_date": "2019-10-03", "pub_date": "2018-07-10", "cvss": 4.6, "cwe_code": 1188, "cwe_name": " Insecure Default Initialization of Resource", "summary": "installation tool ipdt (intel processor diagnostic tool) 4.1.0.24 sets permissions of installed files incorrectly, allowing for execution of arbitrary code and potential privilege escalation.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Insecure Default Initialization of Resource." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 1188:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Insecure Default Initialization of Resource\n- Summary: installation tool ipdt (intel processor diagnostic tool) 4.1.0.24 sets permissions of installed files incorrectly, allowing for execution of arbitrary code and potential privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-07-10\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-0787", "mod_date": "2018-04-11", "pub_date": "2018-03-14", "cvss": 6.8, "cwe_code": 640, "cwe_name": " Weak Password Recovery Mechanism for Forgotten Password", "summary": "asp.net core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to how web applications that are created from templates validate web requests, aka \"asp.net core elevation of privilege vulnerability\".", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Weak Password Recovery Mechanism for Forgotten Password." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 640:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Weak Password Recovery Mechanism for Forgotten Password\n- Summary: asp.net core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to how web applications that are created from templates validate web requests, aka \"asp.net core elevation of privilege vulnerability\".\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-03-14\n- Last Modified Date: 2018-04-11" } ] }, { "Unnamed: 0": "CVE-2017-17589", "mod_date": "2017-12-20", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "fs thumbtack clone 1.0 has sql injection via the browse-category.php cat parameter or the browse-scategory.php sc parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: fs thumbtack clone 1.0 has sql injection via the browse-category.php cat parameter or the browse-scategory.php sc parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-20" } ] }, { "Unnamed: 0": "CVE-2018-12534", "mod_date": "2018-08-08", "pub_date": "2018-06-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection issue was discovered in the quick chat plugin before 4.00 for wordpress.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection issue was discovered in the quick chat plugin before 4.00 for wordpress.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-06-18\n- Last Modified Date: 2018-08-08" } ] }, { "Unnamed: 0": "CVE-2010-1595", "mod_date": "2017-08-17", "pub_date": "2010-04-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in ocsreports/index.php in ocs inventory ng 1.02.1 allow remote attackers to execute arbitrary sql commands via the (1) c, (2) val_1, or (3) onglet_bis parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in ocsreports/index.php in ocs inventory ng 1.02.1 allow remote attackers to execute arbitrary sql commands via the (1) c, (2) val_1, or (3) onglet_bis parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-28\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2017-8590", "mod_date": "2019-10-03", "pub_date": "2017-07-11", "cvss": 4.6, "cwe_code": 281, "cwe_name": " Improper Preservation of Permissions", "summary": "microsoft windows 7 sp1, windows server 2008 sp2 and r2 sp1, windows 8.1 and windows rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability due to the way that the windows common log file system (clfs) driver handles objects in memory, aka \"windows clfs elevation of privilege vulnerability\".", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Preservation of Permissions." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 281:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Improper Preservation of Permissions\n- Summary: microsoft windows 7 sp1, windows server 2008 sp2 and r2 sp1, windows 8.1 and windows rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability due to the way that the windows common log file system (clfs) driver handles objects in memory, aka \"windows clfs elevation of privilege vulnerability\".\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-07-11\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2016-10695", "mod_date": "2019-10-09", "pub_date": "2018-06-04", "cvss": 9.3, "cwe_code": 310, "cwe_name": " Cryptographic Issues", "summary": "the npm-test-sqlite3-trunk module provides asynchronous, non-blocking sqlite3 bindings. npm-test-sqlite3-trunk downloads binary resources over http, which leaves it vulnerable to mitm attacks. it may be possible to cause remote code execution (rce) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Cryptographic Issues." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 310:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 9.3\n- CWE Name: Cryptographic Issues\n- Summary: the npm-test-sqlite3-trunk module provides asynchronous, non-blocking sqlite3 bindings. npm-test-sqlite3-trunk downloads binary resources over http, which leaves it vulnerable to mitm attacks. it may be possible to cause remote code execution (rce) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-06-04\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2019-12516", "mod_date": "2019-10-29", "pub_date": "2019-09-13", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the slickquiz plugin through 1.3.7.1 for wordpress allows sql injection by subscriber users, as demonstrated by a /wp-admin/admin.php?page=slickquiz-scores&id= or /wp-admin/admin.php?page=slickquiz-edit&id= or /wp-admin/admin.php?page=slickquiz-preview&id= uri.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the slickquiz plugin through 1.3.7.1 for wordpress allows sql injection by subscriber users, as demonstrated by a /wp-admin/admin.php?page=slickquiz-scores&id= or /wp-admin/admin.php?page=slickquiz-edit&id= or /wp-admin/admin.php?page=slickquiz-preview&id= uri.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-13\n- Last Modified Date: 2019-10-29" } ] }, { "Unnamed: 0": "CVE-2018-0751", "mod_date": "2019-10-03", "pub_date": "2018-01-04", "cvss": 3.6, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "the windows kernel api in windows 8.1 and rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, 1703 and 1709, windows server 2016 and windows server, version 1709 allows an elevation of privilege vulnerability due to the way the kernel api enforces permissions, aka \"windows elevation of privilege vulnerability\". this cve id is unique from cve-2018-0752.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.6\n- CWE Name: Improper Privilege Management\n- Summary: the windows kernel api in windows 8.1 and rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, 1703 and 1709, windows server 2016 and windows server, version 1709 allows an elevation of privilege vulnerability due to the way the kernel api enforces permissions, aka \"windows elevation of privilege vulnerability\". this cve id is unique from cve-2018-0752.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/NONE\n- Published Date: 2018-01-04\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2009-1778", "mod_date": "2018-10-10", "pub_date": "2009-05-22", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the new user registration feature in bigace cms 2.5, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the username parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the new user registration feature in bigace cms 2.5, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the username parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-22\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2010-5053", "mod_date": "2011-11-28", "pub_date": "2011-11-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the xobbix (com_xobbix) component 1.0.1 for joomla! allows remote attackers to execute arbitrary sql commands via the prodid parameter in a prod_desc action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the xobbix (com_xobbix) component 1.0.1 for joomla! allows remote attackers to execute arbitrary sql commands via the prodid parameter in a prod_desc action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-23\n- Last Modified Date: 2011-11-28" } ] }, { "Unnamed: 0": "CVE-2014-0821", "mod_date": "2015-08-13", "pub_date": "2014-02-27", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the download feature in cybozu garoon 2.x through 2.5.4 and 3.x through 3.7 sp3 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, a different vulnerability than cve-2013-6930 and cve-2013-6931.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the download feature in cybozu garoon 2.x through 2.5.4 and 3.x through 3.7 sp3 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, a different vulnerability than cve-2013-6930 and cve-2013-6931.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-02-27\n- Last Modified Date: 2015-08-13" } ] }, { "Unnamed: 0": "CVE-2009-4390", "mod_date": "2009-12-23", "pub_date": "2009-12-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the car (car) extension 0.1.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the car (car) extension 0.1.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-12-22\n- Last Modified Date: 2009-12-23" } ] }, { "Unnamed: 0": "CVE-2008-6728", "mod_date": "2018-10-11", "pub_date": "2009-04-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the sections module in php-nuke, probably before 8.0, allows remote attackers to execute arbitrary sql commands via the artid parameter in a printpage action to modules.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the sections module in php-nuke, probably before 8.0, allows remote attackers to execute arbitrary sql commands via the artid parameter in a printpage action to modules.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-20\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2013-0511", "mod_date": "2017-08-29", "pub_date": "2013-03-29", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in ibm security appscan enterprise 5.6 and 8.x before 8.7 allow remote authenticated users to execute arbitrary sql commands via unspecified parameters.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in ibm security appscan enterprise 5.6 and 8.x before 8.7 allow remote authenticated users to execute arbitrary sql commands via unspecified parameters.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-03-29\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-4468", "mod_date": "2017-09-29", "pub_date": "2008-10-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in view_news.php in vastal i-tech share zone allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in view_news.php in vastal i-tech share zone allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-07\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2013-5321", "mod_date": "2013-08-21", "pub_date": "2013-08-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in alienvault open source security information management (ossim) 4.1 allow remote attackers to execute arbitrary sql commands via the (1) sensor parameter in a query action to forensics/base_qry_main.php; the (2) tcp_flags[] or (3) tcp_port[0][4] parameter to forensics/base_stat_alerts.php; the (4) ip_addr[1][8] or (5) port_type parameter to forensics/base_stat_ports.php; or the (6) sortby or (7) rvalue parameter in a search action to vulnmeter/index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in alienvault open source security information management (ossim) 4.1 allow remote attackers to execute arbitrary sql commands via the (1) sensor parameter in a query action to forensics/base_qry_main.php; the (2) tcp_flags[] or (3) tcp_port[0][4] parameter to forensics/base_stat_alerts.php; the (4) ip_addr[1][8] or (5) port_type parameter to forensics/base_stat_ports.php; or the (6) sortby or (7) rvalue parameter in a search action to vulnmeter/index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-08-20\n- Last Modified Date: 2013-08-21" } ] }, { "Unnamed: 0": "CVE-2008-2629", "mod_date": "2017-09-29", "pub_date": "2008-06-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the lifetype (formerly plog) module for drupal allows remote attackers to execute arbitrary sql commands via the albumid parameter in a viewalbum action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the lifetype (formerly plog) module for drupal allows remote attackers to execute arbitrary sql commands via the albumid parameter in a viewalbum action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-10\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-17072", "mod_date": "2019-10-10", "pub_date": "2019-10-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the new-contact-form-widget (aka contact form widget - contact query, form maker) plugin 1.0.9 for wordpress has sql injection via all-query-page.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the new-contact-form-widget (aka contact form widget - contact query, form maker) plugin 1.0.9 for wordpress has sql injection via all-query-page.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-10\n- Last Modified Date: 2019-10-10" } ] }, { "Unnamed: 0": "CVE-2017-8574", "mod_date": "2019-10-03", "pub_date": "2017-07-11", "cvss": 6.9, "cwe_code": 281, "cwe_name": " Improper Preservation of Permissions", "summary": "graphics in microsoft windows 10 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka \"microsoft graphics component elevation of privilege vulnerability\". this cve id is unique from cve-2017-8573 and cve-2017-8556.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Preservation of Permissions." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 281:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Improper Preservation of Permissions\n- Summary: graphics in microsoft windows 10 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka \"microsoft graphics component elevation of privilege vulnerability\". this cve id is unique from cve-2017-8573 and cve-2017-8556.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-07-11\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2019-15659", "mod_date": "2019-08-28", "pub_date": "2019-08-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the pie-register plugin before 3.1.2 for wordpress has sql injection, a different issue than cve-2018-10969.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the pie-register plugin before 3.1.2 for wordpress has sql injection, a different issue than cve-2018-10969.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-27\n- Last Modified Date: 2019-08-28" } ] }, { "Unnamed: 0": "CVE-2017-9437", "mod_date": "2017-06-13", "pub_date": "2017-06-05", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "openbravo business suite 3.0 is affected by sql injection. this vulnerability could allow remote authenticated attackers to inject arbitrary sql code.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: openbravo business suite 3.0 is affected by sql injection. this vulnerability could allow remote authenticated attackers to inject arbitrary sql code.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-06-05\n- Last Modified Date: 2017-06-13" } ] }, { "Unnamed: 0": "CVE-2008-4161", "mod_date": "2017-09-29", "pub_date": "2008-09-22", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in search_inv.php in assetman 2.5b allows remote attackers to execute arbitrary sql commands and conduct session fixation attacks via a combination of crafted order and order_by parameters in a search_all action.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in search_inv.php in assetman 2.5b allows remote attackers to execute arbitrary sql commands and conduct session fixation attacks via a combination of crafted order and order_by parameters in a search_all action.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2014-0728", "mod_date": "2015-08-05", "pub_date": "2014-02-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the java database interface in cisco unified communications manager (ucm) 10.0(1) and earlier allows remote attackers to execute arbitrary sql commands via a crafted url, aka bug id cscum05313.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the java database interface in cisco unified communications manager (ucm) 10.0(1) and earlier allows remote attackers to execute arbitrary sql commands via a crafted url, aka bug id cscum05313.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-02-13\n- Last Modified Date: 2015-08-05" } ] }, { "Unnamed: 0": "CVE-2019-1405", "mod_date": "2019-11-12", "pub_date": "2019-11-12", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists when the windows universal plug and play (upnp) service improperly allows com object creation, aka 'windows upnp service elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists when the windows universal plug and play (upnp) service improperly allows com object creation, aka 'windows upnp service elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-12\n- Last Modified Date: 2019-11-12" } ] }, { "Unnamed: 0": "CVE-2019-1041", "mod_date": "2019-06-13", "pub_date": "2019-06-12", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists when the windows kernel fails to properly handle objects in memory, aka 'windows kernel elevation of privilege vulnerability'. this cve id is unique from cve-2019-1065.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists when the windows kernel fails to properly handle objects in memory, aka 'windows kernel elevation of privilege vulnerability'. this cve id is unique from cve-2019-1065.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-06-12\n- Last Modified Date: 2019-06-13" } ] }, { "Unnamed: 0": "CVE-2008-2189", "mod_date": "2018-10-11", "pub_date": "2008-05-14", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in viewfaqs.php in anserv auction xl allows remote attackers to execute arbitrary sql commands via the cat parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in viewfaqs.php in anserv auction xl allows remote attackers to execute arbitrary sql commands via the cat parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-14\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2019-7258", "mod_date": "2019-07-03", "pub_date": "2019-07-02", "cvss": 6.5, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "linear emerge e3-series devices allow privilege escalation.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: linear emerge e3-series devices allow privilege escalation.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-07-02\n- Last Modified Date: 2019-07-03" } ] }, { "Unnamed: 0": "CVE-2015-5191", "mod_date": "2017-08-08", "pub_date": "2017-07-28", "cvss": 3.7, "cwe_code": 362, "cwe_name": " Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", "summary": "vmware tools prior to 10.0.9 contains multiple file system races in libdeploypkg, related to the use of hard-coded paths under /tmp. successful exploitation of this issue may result in a local privilege escalation. cvss:3.0/av:l/ac:h/pr:l/ui:r/s:u/c:h/i:h/a:h", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 362:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.7\n- CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\n- Summary: vmware tools prior to 10.0.9 contains multiple file system races in libdeploypkg, related to the use of hard-coded paths under /tmp. successful exploitation of this issue may result in a local privilege escalation. cvss:3.0/av:l/ac:h/pr:l/ui:r/s:u/c:h/i:h/a:h\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-07-28\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2008-7114", "mod_date": "2017-09-29", "pub_date": "2009-08-28", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in members_search.php in ifusion services ifdate 2.0.3 and earlier allows remote attackers to execute arbitrary sql commands via the name field.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in members_search.php in ifusion services ifdate 2.0.3 and earlier allows remote attackers to execute arbitrary sql commands via the name field.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-08-28\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-4845", "mod_date": "2017-09-29", "pub_date": "2007-09-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in upload/index.php in rw::download 2.0.3 lite allow remote attackers to execute arbitrary sql commands via the (1) dlid or (2) cid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in upload/index.php in rw::download 2.0.3 lite allow remote attackers to execute arbitrary sql commands via the (1) dlid or (2) cid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-09-12\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2011-4763", "mod_date": "2017-08-29", "pub_date": "2011-12-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the site editor (aka sitebuilder) feature in parallels plesk small business panel 10.2.0 allow remote attackers to execute arbitrary sql commands via crafted input to a php script, as demonstrated by wizard/edit/html and certain other files.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the site editor (aka sitebuilder) feature in parallels plesk small business panel 10.2.0 allow remote attackers to execute arbitrary sql commands via crafted input to a php script, as demonstrated by wizard/edit/html and certain other files.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-12-16\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2014-1609", "mod_date": "2017-01-07", "pub_date": "2014-03-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in mantisbt before 1.2.16 allow remote attackers to execute arbitrary sql commands via unspecified parameters to the (1) mc_project_get_attachments function in api/soap/mc_project_api.php; the (2) news_get_limited_rows function in core/news_api.php; the (3) summary_print_by_enum, (4) summary_print_by_age, (5) summary_print_by_developer, (6) summary_print_by_reporter, or (7) summary_print_by_category function in core/summary_api.php; the (8) create_bug_enum_summary or (9) enum_bug_group function in plugins/mantisgraph/core/graph_api.php; (10) bug_graph_bycategory.php or (11) bug_graph_bystatus.php in plugins/mantisgraph/pages/; or (12) proj_doc_page.php, related to use of the db_query function, a different vulnerability than cve-2014-1608.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in mantisbt before 1.2.16 allow remote attackers to execute arbitrary sql commands via unspecified parameters to the (1) mc_project_get_attachments function in api/soap/mc_project_api.php; the (2) news_get_limited_rows function in core/news_api.php; the (3) summary_print_by_enum, (4) summary_print_by_age, (5) summary_print_by_developer, (6) summary_print_by_reporter, or (7) summary_print_by_category function in core/summary_api.php; the (8) create_bug_enum_summary or (9) enum_bug_group function in plugins/mantisgraph/core/graph_api.php; (10) bug_graph_bycategory.php or (11) bug_graph_bystatus.php in plugins/mantisgraph/pages/; or (12) proj_doc_page.php, related to use of the db_query function, a different vulnerability than cve-2014-1608.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-03-20\n- Last Modified Date: 2017-01-07" } ] }, { "Unnamed: 0": "CVE-2017-0475", "mod_date": "2019-10-03", "pub_date": "2017-03-08", "cvss": 9.3, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "an elevation of privilege vulnerability in the recovery verifier could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-31914369.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Input Validation\n- Summary: an elevation of privilege vulnerability in the recovery verifier could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-31914369.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-03-08\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2007-6498", "mod_date": "2018-10-15", "pub_date": "2007-12-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in hosting controller 6.1 hot fix 3.3 and earlier allow remote authenticated users to execute arbitrary sql commands via the (1) email and (2) loginname parameters to hosting/addreseller.asp, (3) the sortfield parameter to accounts/accountmanager.asp, (4) the gatewayid parameter to openapi/gatewayvariables.asp, and possibly (5) unspecified vectors to iis/iibind.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in hosting controller 6.1 hot fix 3.3 and earlier allow remote authenticated users to execute arbitrary sql commands via the (1) email and (2) loginname parameters to hosting/addreseller.asp, (3) the sortfield parameter to accounts/accountmanager.asp, (4) the gatewayid parameter to openapi/gatewayvariables.asp, and possibly (5) unspecified vectors to iis/iibind.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-12-20\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2014-8339", "mod_date": "2018-10-09", "pub_date": "2014-11-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in midroll.php in nuevolab nuevoplayer for clipshare 8.0 and earlier allows remote attackers to execute arbitrary sql commands via the ch parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in midroll.php in nuevolab nuevoplayer for clipshare 8.0 and earlier allows remote attackers to execute arbitrary sql commands via the ch parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-11-04\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2008-3594", "mod_date": "2017-09-29", "pub_date": "2008-08-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in viewdetails.php in magicscripts e-store kit-1, e-store kit-2, e-store kit-1 pro paypal edition, and e-store kit-2 paypal edition allows remote attackers to execute arbitrary sql commands via the pid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in viewdetails.php in magicscripts e-store kit-1, e-store kit-2, e-store kit-1 pro paypal edition, and e-store kit-2 paypal edition allows remote attackers to execute arbitrary sql commands via the pid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-08-11\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-4080", "mod_date": "2018-10-11", "pub_date": "2008-09-15", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in stash 1.0.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the (1) username parameter to admin/library/authenticate.php and the (2) download parameter to downloadmp3.php. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in stash 1.0.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the (1) username parameter to admin/library/authenticate.php and the (2) download parameter to downloadmp3.php. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-15\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2016-3333", "mod_date": "2018-10-12", "pub_date": "2016-11-10", "cvss": 9.3, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "the common log file system (clfs) driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allows local users to gain privileges via a crafted application, aka \"windows common log file system driver elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0026, cve-2016-3332, cve-2016-3334, cve-2016-3335, cve-2016-3338, cve-2016-3340, cve-2016-3342, cve-2016-3343, and cve-2016-7184.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: the common log file system (clfs) driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allows local users to gain privileges via a crafted application, aka \"windows common log file system driver elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0026, cve-2016-3332, cve-2016-3334, cve-2016-3335, cve-2016-3338, cve-2016-3340, cve-2016-3342, cve-2016-3343, and cve-2016-7184.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-10\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2006-0602", "mod_date": "2018-10-19", "pub_date": "2006-02-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in hinton design phphg guestbook 1.2 allow remote attackers to execute arbitrary sql commands via the (1) username parameter to check.php or the id parameter to (2) admin/edit_smilie.php, (3) admin/add_theme.php, (4) admin/ban_ip.php, (5) admin/add_lang.php, or (6) admin/edit_filter.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in hinton design phphg guestbook 1.2 allow remote attackers to execute arbitrary sql commands via the (1) username parameter to check.php or the id parameter to (2) admin/edit_smilie.php, (3) admin/add_theme.php, (4) admin/ban_ip.php, (5) admin/add_lang.php, or (6) admin/edit_filter.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-02-08\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2017-9120", "mod_date": "2019-08-19", "pub_date": "2018-08-02", "cvss": 7.5, "cwe_code": 190, "cwe_name": " Integer Overflow or Wraparound", "summary": "php 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an integer overflow in mysqli_real_escape_string.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Integer Overflow or Wraparound." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 190:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Integer Overflow or Wraparound\n- Summary: php 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an integer overflow in mysqli_real_escape_string.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-08-02\n- Last Modified Date: 2019-08-19" } ] }, { "Unnamed: 0": "CVE-2008-6753", "mod_date": "2017-08-17", "pub_date": "2009-04-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in silverstripe before 2.2.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors related to ajaxuniquetextfield.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in silverstripe before 2.2.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors related to ajaxuniquetextfield.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-27\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2014-0727", "mod_date": "2015-09-16", "pub_date": "2014-02-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the callmanager interactive voice response (cmivr) interface in cisco unified communications manager (ucm) allows remote attackers to execute arbitrary sql commands via a crafted url, aka bug id cscum05318.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the callmanager interactive voice response (cmivr) interface in cisco unified communications manager (ucm) allows remote attackers to execute arbitrary sql commands via a crafted url, aka bug id cscum05318.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-02-13\n- Last Modified Date: 2015-09-16" } ] }, { "Unnamed: 0": "CVE-2008-6782", "mod_date": "2017-09-29", "pub_date": "2009-05-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in directory.php in sites for scripts (sfs) ez hosting directory allows remote attackers to execute arbitrary sql commands via the cat_id parameter in a list action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in directory.php in sites for scripts (sfs) ez hosting directory allows remote attackers to execute arbitrary sql commands via the cat_id parameter in a list action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-01\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-1784", "mod_date": "2019-10-09", "pub_date": "2018-12-20", "cvss": 7.5, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "ibm api connect 5.0.0.0 and 5.0.8.4 is affected by a nosql injection in mongodb connector for the loopback framework. ibm x-force id: 148807.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Input Validation\n- Summary: ibm api connect 5.0.0.0 and 5.0.8.4 is affected by a nosql injection in mongodb connector for the loopback framework. ibm x-force id: 148807.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-12-20\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2016-6700", "mod_date": "2016-12-06", "pub_date": "2016-11-25", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in libzipfile in android 4.x before 4.4.4, 5.0.x before 5.0.2, and 5.1.x before 5.1.1 could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. android id: a-30916186.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in libzipfile in android 4.x before 4.4.4, 5.0.x before 5.0.2, and 5.1.x before 5.1.1 could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. android id: a-30916186.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-25\n- Last Modified Date: 2016-12-06" } ] }, { "Unnamed: 0": "CVE-2012-1017", "mod_date": "2017-08-29", "pub_date": "2012-02-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in base_qry_main.php in basic analysis and security engine (base) 1.4.5 allow remote attackers to execute arbitrary sql commands via the (1) ip_addr[0][1], (2) ip_addr[0][2], or (3) ip_addr[0][9] parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in base_qry_main.php in basic analysis and security engine (base) 1.4.5 allow remote attackers to execute arbitrary sql commands via the (1) ip_addr[0][1], (2) ip_addr[0][2], or (3) ip_addr[0][9] parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-02-08\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2014-1597", "mod_date": "2017-08-29", "pub_date": "2014-02-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the cmdb web application in synetics i-doit pro before 1.2.5 and i-doit open allows remote attackers to execute arbitrary sql commands via the objid parameter to the default uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the cmdb web application in synetics i-doit pro before 1.2.5 and i-doit open allows remote attackers to execute arbitrary sql commands via the objid parameter to the default uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-02-27\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2012-1784", "mod_date": "2018-01-11", "pub_date": "2012-03-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in myjoblist 0.1.3 allows remote attackers to execute arbitrary sql commands via the eid parameter in a profile action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in myjoblist 0.1.3 allows remote attackers to execute arbitrary sql commands via the eid parameter in a profile action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-03-19\n- Last Modified Date: 2018-01-11" } ] }, { "Unnamed: 0": "CVE-2008-4606", "mod_date": "2017-09-29", "pub_date": "2008-10-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in ip reg 0.4 and earlier allow remote attackers to execute arbitrary sql commands via the (1) location_id parameter to locationdel.php and (2) vlan_id parameter to vlanedit.php. note: the vlanview.php and vlandel.php vectors are already covered by cve-2007-6579.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in ip reg 0.4 and earlier allow remote attackers to execute arbitrary sql commands via the (1) location_id parameter to locationdel.php and (2) vlan_id parameter to vlanedit.php. note: the vlanview.php and vlandel.php vectors are already covered by cve-2007-6579.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-18\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-5087", "mod_date": "2008-11-17", "pub_date": "2008-11-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in typo3 another backend login (wrg_anotherbelogin) extension before 0.0.4 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in typo3 another backend login (wrg_anotherbelogin) extension before 0.0.4 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-14\n- Last Modified Date: 2008-11-17" } ] }, { "Unnamed: 0": "CVE-2010-4843", "mod_date": "2017-08-29", "pub_date": "2011-09-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in website-page.php in php web scripts ad manager pro 3.0 allows remote attackers to execute arbitrary sql commands via the pageid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in website-page.php in php web scripts ad manager pro 3.0 allows remote attackers to execute arbitrary sql commands via the pageid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-09-27\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2018-7065", "mod_date": "2019-02-05", "pub_date": "2018-12-07", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an authenticated sql injection vulnerability in aruba clearpass policy manager can lead to privilege escalation. all versions of clearpass are affected by multiple authenticated sql injection vulnerabilities. in each case, an authenticated administrative user of any type could exploit this vulnerability to gain access to \"appadmin\" credentials, leading to complete cluster compromise. resolution: fixed in 6.7.6 and 6.6.10-hotfix.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an authenticated sql injection vulnerability in aruba clearpass policy manager can lead to privilege escalation. all versions of clearpass are affected by multiple authenticated sql injection vulnerabilities. in each case, an authenticated administrative user of any type could exploit this vulnerability to gain access to \"appadmin\" credentials, leading to complete cluster compromise. resolution: fixed in 6.7.6 and 6.6.10-hotfix.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-12-07\n- Last Modified Date: 2019-02-05" } ] }, { "Unnamed: 0": "CVE-2006-3430", "mod_date": "2018-10-18", "pub_date": "2006-07-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in checkprofile.asp in (1) patchlink update server (plus) before 6.1 p1 and 6.2.x before 6.2 sr1 p1 and (2) novell zenworks 6.2 sr1 and earlier, allows remote attackers to execute arbitrary sql commands via the agentid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in checkprofile.asp in (1) patchlink update server (plus) before 6.1 p1 and 6.2.x before 6.2 sr1 p1 and (2) novell zenworks 6.2 sr1 and earlier, allows remote attackers to execute arbitrary sql commands via the agentid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-07-07\n- Last Modified Date: 2018-10-18" } ] }, { "Unnamed: 0": "CVE-2008-0833", "mod_date": "2017-09-29", "pub_date": "2008-02-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the com_galeria component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the com_galeria component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-20\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-10922", "mod_date": "2019-08-26", "pub_date": "2019-08-22", "cvss": 7.5, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the woocommerce-store-toolkit plugin before 1.5.7 for wordpress has privilege escalation.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.5\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the woocommerce-store-toolkit plugin before 1.5.7 for wordpress has privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-22\n- Last Modified Date: 2019-08-26" } ] }, { "Unnamed: 0": "CVE-2008-5772", "mod_date": "2017-09-29", "pub_date": "2008-12-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in aspsiteware realtylistings 1.0 and 2.0 allow remote attackers to execute arbitrary sql commands via the (1) itype parameter to type.asp and the (2) ipro parameter to detail.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in aspsiteware realtylistings 1.0 and 2.0 allow remote attackers to execute arbitrary sql commands via the (1) itype parameter to type.asp and the (2) ipro parameter to detail.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-30\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-10748", "mod_date": "2019-10-31", "pub_date": "2019-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sequelize all versions prior to 3.35.1, 4.44.3, and 5.8.11 are vulnerable to sql injection due to json path keys not being properly escaped for the mysql/mariadb dialects.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sequelize all versions prior to 3.35.1, 4.44.3, and 5.8.11 are vulnerable to sql injection due to json path keys not being properly escaped for the mysql/mariadb dialects.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-29\n- Last Modified Date: 2019-10-31" } ] }, { "Unnamed: 0": "CVE-2008-0397", "mod_date": "2017-09-29", "pub_date": "2008-01-23", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in aflog 1.01, and possibly earlier versions, allow remote attackers to execute arbitrary sql commands via (1) the id parameter to comments.php and (2) an unspecified parameter to view.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in aflog 1.01, and possibly earlier versions, allow remote attackers to execute arbitrary sql commands via (1) the id parameter to comments.php and (2) an unspecified parameter to view.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-23\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-3212", "mod_date": "2017-08-17", "pub_date": "2010-09-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in seagull 0.6.7 and earlier allows remote attackers to execute arbitrary sql commands via the frmquestion parameter in a retrieve action, in conjunction with a user/password path_info.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in seagull 0.6.7 and earlier allows remote attackers to execute arbitrary sql commands via the frmquestion parameter in a retrieve action, in conjunction with a user/password path_info.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-09-03\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2007-6540", "mod_date": "2018-10-15", "pub_date": "2007-12-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in neuron news 1.0 allows remote attackers to execute arbitrary sql commands via the q parameter to the default uri in patch/.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in neuron news 1.0 allows remote attackers to execute arbitrary sql commands via the q parameter to the default uri in patch/.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-12-27\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2007-4863", "mod_date": "2018-10-15", "pub_date": "2007-10-30", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in example.php in saxon 5.4 allows remote attackers to execute arbitrary sql commands via the template parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in example.php in saxon 5.4 allows remote attackers to execute arbitrary sql commands via the template parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-10-30\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2010-2135", "mod_date": "2017-08-17", "pub_date": "2010-06-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in login.php in hazelpress lite 0.0.4 and earlier allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in login.php in hazelpress lite 0.0.4 and earlier allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-06-02\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2008-2065", "mod_date": "2017-09-29", "pub_date": "2008-05-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in jokes.php in yourfreeworld jokes site script allows remote attackers to execute arbitrary sql commands via the catagorie parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in jokes.php in yourfreeworld jokes site script allows remote attackers to execute arbitrary sql commands via the catagorie parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-02\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2014-3483", "mod_date": "2019-08-08", "pub_date": "2014-07-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb in the postgresql adapter for active record in ruby on rails 4.x before 4.0.7 and 4.1.x before 4.1.3 allows remote attackers to execute arbitrary sql commands by leveraging improper range quoting.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb in the postgresql adapter for active record in ruby on rails 4.x before 4.0.7 and 4.1.x before 4.1.3 allows remote attackers to execute arbitrary sql commands by leveraging improper range quoting.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-07-07\n- Last Modified Date: 2019-08-08" } ] }, { "Unnamed: 0": "CVE-2008-6907", "mod_date": "2017-09-29", "pub_date": "2009-08-06", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in checkuser.php in 2532designs 2532|gigs 1.2.2 stable, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters, as accessible from a form generated by index.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in checkuser.php in 2532designs 2532|gigs 1.2.2 stable, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters, as accessible from a form generated by index.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-08-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-3056", "mod_date": "2011-01-28", "pub_date": "2010-08-24", "cvss": 4.3, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "multiple cross-site scripting (xss) vulnerabilities in phpmyadmin 2.11.x before 2.11.10.1 and 3.x before 3.3.5.1 allow remote attackers to inject arbitrary web script or html via vectors related to (1) db_search.php, (2) db_sql.php, (3) db_structure.php, (4) js/messages.php, (5) libraries/common.lib.php, (6) libraries/database_interface.lib.php, (7) libraries/dbi/mysql.dbi.lib.php, (8) libraries/dbi/mysqli.dbi.lib.php, (9) libraries/db_info.inc.php, (10) libraries/sanitizing.lib.php, (11) libraries/sqlparser.lib.php, (12) server_databases.php, (13) server_privileges.php, (14) setup/config.php, (15) sql.php, (16) tbl_replace.php, and (17) tbl_sql.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.3\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: multiple cross-site scripting (xss) vulnerabilities in phpmyadmin 2.11.x before 2.11.10.1 and 3.x before 3.3.5.1 allow remote attackers to inject arbitrary web script or html via vectors related to (1) db_search.php, (2) db_sql.php, (3) db_structure.php, (4) js/messages.php, (5) libraries/common.lib.php, (6) libraries/database_interface.lib.php, (7) libraries/dbi/mysql.dbi.lib.php, (8) libraries/dbi/mysqli.dbi.lib.php, (9) libraries/db_info.inc.php, (10) libraries/sanitizing.lib.php, (11) libraries/sqlparser.lib.php, (12) server_databases.php, (13) server_privileges.php, (14) setup/config.php, (15) sql.php, (16) tbl_replace.php, and (17) tbl_sql.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2010-08-24\n- Last Modified Date: 2011-01-28" } ] }, { "Unnamed: 0": "CVE-2012-6654", "mod_date": "2017-09-08", "pub_date": "2014-08-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in zpanel 10.0.1 and earlier allow remote attackers to execute arbitrary sql commands via the (1) resetkey or (2) inconfemail parameter to index.php, a different vulnerability than cve-2012-5685.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in zpanel 10.0.1 and earlier allow remote attackers to execute arbitrary sql commands via the (1) resetkey or (2) inconfemail parameter to index.php, a different vulnerability than cve-2012-5685.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-08-14\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2017-8179", "mod_date": "2017-12-08", "pub_date": "2017-11-22", "cvss": 6.8, "cwe_code": 119, "cwe_name": " Improper Restriction of Operations within the Bounds of a Memory Buffer", "summary": "the camera driver of mtk platform in huawei smart phones with software of versions earlier than nice-al00c00b155 has a buffer overflow vulnerability.due to the insufficient input verification, an attacker tricks a user into installing a malicious application which has special privilege and sends a specific parameter to the driver of the smart phone, causing privilege escalation.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 119:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\n- Summary: the camera driver of mtk platform in huawei smart phones with software of versions earlier than nice-al00c00b155 has a buffer overflow vulnerability.due to the insufficient input verification, an attacker tricks a user into installing a malicious application which has special privilege and sends a specific parameter to the driver of the smart phone, causing privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-11-22\n- Last Modified Date: 2017-12-08" } ] }, { "Unnamed: 0": "CVE-2016-8458", "mod_date": "2017-01-24", "pub_date": "2017-01-12", "cvss": 7.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31968442.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31968442.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-01-12\n- Last Modified Date: 2017-01-24" } ] }, { "Unnamed: 0": "CVE-2009-2924", "mod_date": "2017-09-19", "pub_date": "2009-08-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in videos broadcast yourself 2 allow remote attackers to execute arbitrary sql commands via the (1) uploadid parameter to videoint.php, and possibly the (2) cat_id parameter to catvideo.php and (3) uid parameter to cviewchannels.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in videos broadcast yourself 2 allow remote attackers to execute arbitrary sql commands via the (1) uploadid parameter to videoint.php, and possibly the (2) cat_id parameter to catvideo.php and (3) uid parameter to cviewchannels.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-08-21\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-2692", "mod_date": "2017-09-29", "pub_date": "2008-06-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the yvcomment (com_yvcomment) component 1.16.0 and earlier for joomla! allows remote attackers to execute arbitrary sql commands via the articleid parameter in a comment action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the yvcomment (com_yvcomment) component 1.16.0 and earlier for joomla! allows remote attackers to execute arbitrary sql commands via the articleid parameter in a comment action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-13\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-6217", "mod_date": "2018-10-15", "pub_date": "2007-12-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in login.asp in irola my-time (aka timesheet) 3.5 allow remote attackers to execute arbitrary sql commands via the (1) login (aka username) and (2) password parameters. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in login.asp in irola my-time (aka timesheet) 3.5 allow remote attackers to execute arbitrary sql commands via the (1) login (aka username) and (2) password parameters. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-12-04\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2019-1396", "mod_date": "2019-11-12", "pub_date": "2019-11-12", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-1393, cve-2019-1394, cve-2019-1395, cve-2019-1408, cve-2019-1434.", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-1393, cve-2019-1394, cve-2019-1395, cve-2019-1408, cve-2019-1434.\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-12\n- Last Modified Date: 2019-11-12" } ] }, { "Unnamed: 0": "CVE-2008-2278", "mod_date": "2017-09-29", "pub_date": "2008-05-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in browseproject.php in freelance auction script 1.0 allows remote attackers to execute arbitrary sql commands via the pid parameter in a pdetails action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in browseproject.php in freelance auction script 1.0 allows remote attackers to execute arbitrary sql commands via the pid parameter in a pdetails action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-16\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-0284", "mod_date": "2017-09-29", "pub_date": "2009-01-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in category.php in flax article manager 1.1 allows remote attackers to execute arbitrary sql commands via the cat_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in category.php in flax article manager 1.1 allows remote attackers to execute arbitrary sql commands via the cat_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-27\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-7886", "mod_date": "2017-05-15", "pub_date": "2017-05-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "dolibarr erp/crm 4.0.4 has sql injection in doli/theme/eldy/style.css.php via the lang parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: dolibarr erp/crm 4.0.4 has sql injection in doli/theme/eldy/style.css.php via the lang parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-05-10\n- Last Modified Date: 2017-05-15" } ] }, { "Unnamed: 0": "CVE-2013-5003", "mod_date": "2016-12-31", "pub_date": "2013-07-31", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in phpmyadmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allow remote authenticated users to execute arbitrary sql commands via (1) the scale parameter to pmd_pdf.php or (2) the pdf_page_number parameter to schema_export.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in phpmyadmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allow remote authenticated users to execute arbitrary sql commands via (1) the scale parameter to pmd_pdf.php or (2) the pdf_page_number parameter to schema_export.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-07-31\n- Last Modified Date: 2016-12-31" } ] }, { "Unnamed: 0": "CVE-2008-3378", "mod_date": "2017-09-29", "pub_date": "2008-07-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in comment.php in fizzmedia 1.51.2 allows remote attackers to execute arbitrary sql commands via the mid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in comment.php in fizzmedia 1.51.2 allows remote attackers to execute arbitrary sql commands via the mid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-30\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-1417", "mod_date": "2019-11-12", "pub_date": "2019-11-12", "cvss": 4.6, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists when the windows data sharing service improperly handles file operations, aka 'windows data sharing service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1379, cve-2019-1383.", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists when the windows data sharing service improperly handles file operations, aka 'windows data sharing service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1379, cve-2019-1383.\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-12\n- Last Modified Date: 2019-11-12" } ] }, { "Unnamed: 0": "CVE-2008-6405", "mod_date": "2017-09-29", "pub_date": "2009-03-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in showcategory.php in hotscripts clone allows remote attackers to execute arbitrary sql commands via the cid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in showcategory.php in hotscripts clone allows remote attackers to execute arbitrary sql commands via the cid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-0353", "mod_date": "2017-09-29", "pub_date": "2008-01-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in visualizza_tabelle.php in php-residence 0.7.2 and 1.0 allows remote attackers to execute arbitrary sql commands via the cognome_cerca parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in visualizza_tabelle.php in php-residence 0.7.2 and 1.0 allows remote attackers to execute arbitrary sql commands via the cognome_cerca parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-18\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2013-3961", "mod_date": "2017-08-29", "pub_date": "2014-03-11", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in edit_event.php in simple php agenda before 2.2.9 allows remote authenticated users to execute arbitrary sql commands via the eventid parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in edit_event.php in simple php agenda before 2.2.9 allows remote authenticated users to execute arbitrary sql commands via the eventid parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-03-11\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-0267", "mod_date": "2018-10-15", "pub_date": "2008-01-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in eticket 1.5.5.2 allow remote authenticated users to execute arbitrary sql commands via the (1) status, (2) sort, and (3) way parameters to search.php; and allow remote authenticated administrators to execute arbitrary sql commands via the (4) msg and (5) password parameters to admin.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in eticket 1.5.5.2 allow remote authenticated users to execute arbitrary sql commands via the (1) status, (2) sort, and (3) way parameters to search.php; and allow remote authenticated administrators to execute arbitrary sql commands via the (4) msg and (5) password parameters to admin.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-15\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2009-3497", "mod_date": "2009-10-01", "pub_date": "2009-09-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in view_listing.php in vastal i-tech agent zone (aka the real estate script) allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in view_listing.php in vastal i-tech agent zone (aka the real estate script) allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-30\n- Last Modified Date: 2009-10-01" } ] }, { "Unnamed: 0": "CVE-2019-1435", "mod_date": "2019-11-12", "pub_date": "2019-11-12", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists when the windows graphics component improperly handles objects in memory, aka 'windows graphics component elevation of privilege vulnerability'. this cve id is unique from cve-2019-1407, cve-2019-1433, cve-2019-1437, cve-2019-1438.", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists when the windows graphics component improperly handles objects in memory, aka 'windows graphics component elevation of privilege vulnerability'. this cve id is unique from cve-2019-1407, cve-2019-1433, cve-2019-1437, cve-2019-1438.\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-12\n- Last Modified Date: 2019-11-12" } ] }, { "Unnamed: 0": "CVE-2007-6645", "mod_date": "2008-11-15", "pub_date": "2008-01-04", "cvss": 7.5, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "unspecified vulnerability in joomla! before 1.5 rc4 allows remote authenticated users to gain privileges via unspecified vectors, aka \"registered user privilege escalation vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.5\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: unspecified vulnerability in joomla! before 1.5 rc4 allows remote authenticated users to gain privileges via unspecified vectors, aka \"registered user privilege escalation vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-04\n- Last Modified Date: 2008-11-15" } ] }, { "Unnamed: 0": "CVE-2009-2389", "mod_date": "2017-09-19", "pub_date": "2009-07-09", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in newsscript.php in usolved newsolved 1.1.6, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) jahr or (2) idneu parameter in an archive action, or (3) the newsid parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in newsscript.php in usolved newsolved 1.1.6, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) jahr or (2) idneu parameter in an archive action, or (3) the newsid parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-09\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2003-1532", "mod_date": "2018-10-19", "pub_date": "2003-12-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in compte.php in phpmyshop 1.00 allows remote attackers to execute arbitrary sql commands via the (1) identifiant and (2) password parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in compte.php in phpmyshop 1.00 allows remote attackers to execute arbitrary sql commands via the (1) identifiant and (2) password parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2003-12-31\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2019-12385", "mod_date": "2019-08-30", "pub_date": "2019-08-22", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in ampache through 3.9.1. the search engine is affected by a sql injection, so any user able to perform lib/class/search.class.php searches (even guest users) can dump any data contained in the database (sessions, hashed passwords, etc.). this may lead to a full compromise of admin accounts, when combined with the weak password generator algorithm used in the lostpassword functionality.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in ampache through 3.9.1. the search engine is affected by a sql injection, so any user able to perform lib/class/search.class.php searches (even guest users) can dump any data contained in the database (sessions, hashed passwords, etc.). this may lead to a full compromise of admin accounts, when combined with the weak password generator algorithm used in the lostpassword functionality.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-22\n- Last Modified Date: 2019-08-30" } ] }, { "Unnamed: 0": "CVE-2019-10653", "mod_date": "2019-07-11", "pub_date": "2019-07-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in hsycms v1.1. there is a sql injection vulnerability via a /news/*.html page.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in hsycms v1.1. there is a sql injection vulnerability via a /news/*.html page.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-07-10\n- Last Modified Date: 2019-07-11" } ] }, { "Unnamed: 0": "CVE-2008-4895", "mod_date": "2017-09-29", "pub_date": "2008-11-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in tr.php in yourfreeworld downline builder allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in tr.php in yourfreeworld downline builder allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-04\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2015-2489", "mod_date": "2018-10-12", "pub_date": "2015-09-09", "cvss": 4.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft internet explorer 11 allows remote attackers to gain privileges via a crafted web site, as demonstrated by a transition from low integrity to medium integrity, aka \"elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft internet explorer 11 allows remote attackers to gain privileges via a crafted web site, as demonstrated by a transition from low integrity to medium integrity, aka \"elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2015-09-09\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2009-4728", "mod_date": "2017-09-19", "pub_date": "2010-03-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the administrative interface in questions answered 1.3 allows remote attackers to execute arbitrary sql commands via the username parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the administrative interface in questions answered 1.3 allows remote attackers to execute arbitrary sql commands via the username parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-03-18\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2007-3705", "mod_date": "2018-10-15", "pub_date": "2007-07-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in fusetalk 2.0 allows remote attackers to execute arbitrary sql commands via the ftvar_subcat (txforumid) parameter to forum/index.cfm and possibly other unspecified components, related to forum/include/error/forumerror.cfm.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in fusetalk 2.0 allows remote attackers to execute arbitrary sql commands via the ftvar_subcat (txforumid) parameter to forum/index.cfm and possibly other unspecified components, related to forum/include/error/forumerror.cfm.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-07-11\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2019-1170", "mod_date": "2019-08-23", "pub_date": "2019-08-14", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists when reparse points are created by sandboxed processes allowing sandbox escape, aka 'windows ntfs elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists when reparse points are created by sandboxed processes allowing sandbox escape, aka 'windows ntfs elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-08-14\n- Last Modified Date: 2019-08-23" } ] }, { "Unnamed: 0": "CVE-2016-7211", "mod_date": "2018-10-12", "pub_date": "2016-10-14", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\" a different vulnerability than cve-2016-3266, cve-2016-3376, and cve-2016-7185.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\" a different vulnerability than cve-2016-3266, cve-2016-3376, and cve-2016-7185.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-10-14\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2014-3138", "mod_date": "2017-08-29", "pub_date": "2014-05-02", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in xerox docushare before 6.53 patch 6 hotfix 2, 6.6.1 update 1 before hotfix 24, and 6.6.1 update 2 before hotfix 3 allows remote authenticated users to execute arbitrary sql commands via the path_info to /docushare/dsweb/resultbackgroundjobmultiple/. note: some of these details are obtained from third party information.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in xerox docushare before 6.53 patch 6 hotfix 2, 6.6.1 update 1 before hotfix 24, and 6.6.1 update 2 before hotfix 3 allows remote authenticated users to execute arbitrary sql commands via the path_info to /docushare/dsweb/resultbackgroundjobmultiple/. note: some of these details are obtained from third party information.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-05-02\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2018-19998", "mod_date": "2019-01-11", "pub_date": "2019-01-03", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in user/card.php in dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary sql commands via the employee parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in user/card.php in dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary sql commands via the employee parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-01-03\n- Last Modified Date: 2019-01-11" } ] }, { "Unnamed: 0": "CVE-2018-17410", "mod_date": "2018-11-13", "pub_date": "2018-09-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "horus cms allows sql injection, as demonstrated by a request to the /busca or /home uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: horus cms allows sql injection, as demonstrated by a request to the /busca or /home uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-09-26\n- Last Modified Date: 2018-11-13" } ] }, { "Unnamed: 0": "CVE-2018-12636", "mod_date": "2018-08-13", "pub_date": "2018-06-22", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the ithemes security (better-wp-security) plugin before 7.0.3 for wordpress allows sql injection (by attackers with admin privileges) via the logs page.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the ithemes security (better-wp-security) plugin before 7.0.3 for wordpress allows sql injection (by attackers with admin privileges) via the logs page.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-06-22\n- Last Modified Date: 2018-08-13" } ] }, { "Unnamed: 0": "CVE-2008-4599", "mod_date": "2017-09-29", "pub_date": "2008-10-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in category.php in mosaic commerce allows remote attackers to execute arbitrary sql commands via the cid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in category.php in mosaic commerce allows remote attackers to execute arbitrary sql commands via the cid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-18\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-1479", "mod_date": "2010-06-11", "pub_date": "2010-04-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the rokmodule (com_rokmodule) component 1.1 for joomla! allows remote attackers to execute arbitrary sql commands via the moduleid parameter in a raw action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the rokmodule (com_rokmodule) component 1.1 for joomla! allows remote attackers to execute arbitrary sql commands via the moduleid parameter in a raw action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-19\n- Last Modified Date: 2010-06-11" } ] }, { "Unnamed: 0": "CVE-2014-10029", "mod_date": "2017-09-08", "pub_date": "2015-01-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in profile.php in fluxbb before 1.4.13 and 1.5.x before 1.5.7 allows remote attackers to execute arbitrary sql commands via the req_new_email parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in profile.php in fluxbb before 1.4.13 and 1.5.x before 1.5.7 allows remote attackers to execute arbitrary sql commands via the req_new_email parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-13\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2017-1269", "mod_date": "2017-07-13", "pub_date": "2017-07-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "ibm security guardium 10.0 and 10.1 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 124744", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ibm security guardium 10.0 and 10.1 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 124744\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-07-05\n- Last Modified Date: 2017-07-13" } ] }, { "Unnamed: 0": "CVE-2017-17633", "mod_date": "2017-12-29", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiplex movie theater booking script 3.1.5 has sql injection via the trailer-detail.php moid parameter, show-time.php moid parameter, or event-detail.php eid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiplex movie theater booking script 3.1.5 has sql injection via the trailer-detail.php moid parameter, show-time.php moid parameter, or event-detail.php eid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-29" } ] }, { "Unnamed: 0": "CVE-2016-9488", "mod_date": "2018-09-11", "pub_date": "2018-06-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "manageengine applications manager versions 12 and 13 before build 13200 suffer from remote sql injection vulnerabilities. an unauthenticated attacker is able to access the url /servlet/menuhandlerservlet, which is vulnerable to sql injection. the attacker could extract users' password hashes, which are md5 hashes without salt, and, depending on the database type and its configuration, could also execute operating system commands using sql queries.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: manageengine applications manager versions 12 and 13 before build 13200 suffer from remote sql injection vulnerabilities. an unauthenticated attacker is able to access the url /servlet/menuhandlerservlet, which is vulnerable to sql injection. the attacker could extract users' password hashes, which are md5 hashes without salt, and, depending on the database type and its configuration, could also execute operating system commands using sql queries.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-06-05\n- Last Modified Date: 2018-09-11" } ] }, { "Unnamed: 0": "CVE-2018-0607", "mod_date": "2018-09-24", "pub_date": "2018-07-26", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the notifications application in the cybozu garoon 3.5.0 to 4.6.2 allows remote authenticated attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the notifications application in the cybozu garoon 3.5.0 to 4.6.2 allows remote authenticated attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-07-26\n- Last Modified Date: 2018-09-24" } ] }, { "Unnamed: 0": "CVE-2016-10288", "mod_date": "2017-05-19", "pub_date": "2017-05-12", "cvss": 7.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the qualcomm led driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.18. android id: a-33863909. references: qc-cr#1109763.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the qualcomm led driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.18. android id: a-33863909. references: qc-cr#1109763.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-05-12\n- Last Modified Date: 2017-05-19" } ] }, { "Unnamed: 0": "CVE-2015-2429", "mod_date": "2019-05-15", "pub_date": "2015-08-15", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 allow attackers to bypass an application sandbox protection mechanism and perform unspecified registry actions via a crafted application, aka \"windows registry elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, and windows rt gold and 8.1 allow attackers to bypass an application sandbox protection mechanism and perform unspecified registry actions via a crafted application, aka \"windows registry elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-08-15\n- Last Modified Date: 2019-05-15" } ] }, { "Unnamed: 0": "CVE-2015-6331", "mod_date": "2016-12-09", "pub_date": "2015-10-12", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the web framework in cisco prime collaboration assurance 10.5(1) allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscus39887.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the web framework in cisco prime collaboration assurance 10.5(1) allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscus39887.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-10-12\n- Last Modified Date: 2016-12-09" } ] }, { "Unnamed: 0": "CVE-2019-1260", "mod_date": "2019-09-12", "pub_date": "2019-09-11", "cvss": 4.0, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists in microsoft sharepoint, aka 'microsoft sharepoint elevation of privilege vulnerability'.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.0\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists in microsoft sharepoint, aka 'microsoft sharepoint elevation of privilege vulnerability'.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2019-09-11\n- Last Modified Date: 2019-09-12" } ] }, { "Unnamed: 0": "CVE-2018-16385", "mod_date": "2018-10-31", "pub_date": "2018-09-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "thinkphp before 5.1.23 allows sql injection via the public/index/index/test/index query string.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: thinkphp before 5.1.23 allows sql injection via the public/index/index/test/index query string.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-09-03\n- Last Modified Date: 2018-10-31" } ] }, { "Unnamed: 0": "CVE-2016-6741", "mod_date": "2016-11-28", "pub_date": "2016-11-25", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the qualcomm camera driver in android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. android id: a-30559423. references: qualcomm qc-cr#1060554.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the qualcomm camera driver in android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. android id: a-30559423. references: qualcomm qc-cr#1060554.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-25\n- Last Modified Date: 2016-11-28" } ] }, { "Unnamed: 0": "CVE-2008-4765", "mod_date": "2017-09-29", "pub_date": "2008-10-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in pollbooth.php in oscommerce poll booth add-on 2.0 allows remote attackers to execute arbitrary sql commands via the pollid parameter in a results operation. note: this issue was disclosed by an unreliable researcher, so it might be incorrect.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in pollbooth.php in oscommerce poll booth add-on 2.0 allows remote attackers to execute arbitrary sql commands via the pollid parameter in a results operation. note: this issue was disclosed by an unreliable researcher, so it might be incorrect.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-28\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-3254", "mod_date": "2018-10-12", "pub_date": "2016-07-13", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3249, cve-2016-3252, and cve-2016-3286.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3249, cve-2016-3252, and cve-2016-3286.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-07-13\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2007-2230", "mod_date": "2018-10-16", "pub_date": "2007-04-25", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ca clever path portal allows remote authenticated users to execute limited sql commands and retrieve arbitrary database contents via (1) the ofinterest parameter in a light search query, (2) description parameter in the advanced search query, and possibly other vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ca clever path portal allows remote authenticated users to execute limited sql commands and retrieve arbitrary database contents via (1) the ofinterest parameter in a light search query, (2) description parameter in the advanced search query, and possibly other vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-04-25\n- Last Modified Date: 2018-10-16" } ] }, { "Unnamed: 0": "CVE-2009-0431", "mod_date": "2009-02-05", "pub_date": "2009-02-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in default.asp in linkspro standard edition allows remote attackers to execute arbitrary sql commands via the orderdirection parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in default.asp in linkspro standard edition allows remote attackers to execute arbitrary sql commands via the orderdirection parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-05\n- Last Modified Date: 2009-02-05" } ] }, { "Unnamed: 0": "CVE-2006-2157", "mod_date": "2017-07-20", "pub_date": "2006-05-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in gallery.php in plogger beta 2.1 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter, when the level is set to \"slideshow\". note: this is a different vulnerability than cve-2005-4246.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in gallery.php in plogger beta 2.1 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter, when the level is set to \"slideshow\". note: this is a different vulnerability than cve-2005-4246.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-05-03\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2009-2209", "mod_date": "2017-09-29", "pub_date": "2009-06-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in rscms_mod_newsview.php in rs-cms 2.1 allows remote attackers to execute arbitrary sql commands via the key parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in rscms_mod_newsview.php in rs-cms 2.1 allows remote attackers to execute arbitrary sql commands via the key parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-06-25\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-4173", "mod_date": "2018-10-15", "pub_date": "2007-08-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in duyuruoku.asp in hunkaray okul portali 1.1 allows remote attackers to execute arbitrary sql commands via the id parameter, a different vector than cve-2007-3080.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in duyuruoku.asp in hunkaray okul portali 1.1 allows remote attackers to execute arbitrary sql commands via the id parameter, a different vector than cve-2007-3080.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-08-07\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2014-1651", "mod_date": "2017-12-28", "pub_date": "2014-06-18", "cvss": 5.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in clientreport.php in the management console in symantec web gateway (swg) before 5.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "ADJACENT_NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in clientreport.php in the management console in symantec web gateway (swg) before 5.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: ADJACENT_NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-06-18\n- Last Modified Date: 2017-12-28" } ] }, { "Unnamed: 0": "CVE-2008-2114", "mod_date": "2017-09-29", "pub_date": "2008-05-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in emall/search.php in pre shopping mall 1.1 allows remote attackers to execute arbitrary sql commands via the search parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in emall/search.php in pre shopping mall 1.1 allows remote attackers to execute arbitrary sql commands via the search parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-08\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-0543", "mod_date": "2009-06-09", "pub_date": "2009-02-12", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "proftpd server 1.3.1, with nls support enabled, allows remote attackers to bypass sql injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: proftpd server 1.3.1, with nls support enabled, allows remote attackers to bypass sql injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-12\n- Last Modified Date: 2009-06-09" } ] }, { "Unnamed: 0": "CVE-2008-2554", "mod_date": "2018-10-11", "pub_date": "2008-06-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in bp blog 6.0 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to template_permalink.asp and (2) cat parameter to template_archives_cat.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in bp blog 6.0 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to template_permalink.asp and (2) cat parameter to template_archives_cat.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-05\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2010-4864", "mod_date": "2012-02-14", "pub_date": "2011-10-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the club manager (com_clubmanager) component for joomla! allows remote attackers to execute arbitrary sql commands via the cm_id parameter in an equip presenta action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the club manager (com_clubmanager) component for joomla! allows remote attackers to execute arbitrary sql commands via the cm_id parameter in an equip presenta action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-10-05\n- Last Modified Date: 2012-02-14" } ] }, { "Unnamed: 0": "CVE-2009-4057", "mod_date": "2017-08-17", "pub_date": "2009-11-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the inertialfate if portfolio nexus (com_if_nexus) component 1.1 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in an item action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the inertialfate if portfolio nexus (com_if_nexus) component 1.1 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in an item action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-11-24\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2009-3316", "mod_date": "2017-09-19", "pub_date": "2009-09-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the jreservation (com_jreservation) component 1.0 and 1.5 for joomla! allows remote attackers to execute arbitrary sql commands via the pid parameter in a propertycpanel action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the jreservation (com_jreservation) component 1.0 and 1.5 for joomla! allows remote attackers to execute arbitrary sql commands via the pid parameter in a propertycpanel action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-23\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-0611", "mod_date": "2017-09-29", "pub_date": "2008-02-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in rmgs/images.php in the rmsoft gallery system 2.0 module for xoops allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in rmgs/images.php in the rmsoft gallery system 2.0 module for xoops allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-17581", "mod_date": "2017-12-20", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "fs quibids clone 1.0 has sql injection via the itechd.php productid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: fs quibids clone 1.0 has sql injection via the itechd.php productid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-20" } ] }, { "Unnamed: 0": "CVE-2018-12977", "mod_date": "2018-09-05", "pub_date": "2018-07-09", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability in the softexpert (se) excellence suite 2.0 allows remote authenticated users to perform sql heuristics by pulling information from the database with the \"cddocument\" parameter in the \"downloading electronic documents\" section.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability in the softexpert (se) excellence suite 2.0 allows remote authenticated users to perform sql heuristics by pulling information from the database with the \"cddocument\" parameter in the \"downloading electronic documents\" section.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-07-09\n- Last Modified Date: 2018-09-05" } ] }, { "Unnamed: 0": "CVE-2009-0379", "mod_date": "2017-09-29", "pub_date": "2009-02-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the prince clan chess club (com_pcchess) component for joomla! allows remote attackers to execute arbitrary sql commands via the game_id parameter in a showgame action to index.php, a different vector than cve-2008-0761.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the prince clan chess club (com_pcchess) component for joomla! allows remote attackers to execute arbitrary sql commands via the game_id parameter in a showgame action to index.php, a different vector than cve-2008-0761.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-02\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-5151", "mod_date": "2019-11-04", "pub_date": "2019-10-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an exploitable sql injection vulnerability exist in youphptube 7.7. a specially crafted unauthenticated http request can cause a sql injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution. an attacker can send an http request to trigger this vulnerability.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an exploitable sql injection vulnerability exist in youphptube 7.7. a specially crafted unauthenticated http request can cause a sql injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution. an attacker can send an http request to trigger this vulnerability.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-31\n- Last Modified Date: 2019-11-04" } ] }, { "Unnamed: 0": "CVE-2014-8367", "mod_date": "2018-12-18", "pub_date": "2014-11-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in aruba networks clearpass policy manager (cppm) 6.2.x, 6.3.x before 6.3.6, and 6.4.x before 6.4.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in aruba networks clearpass policy manager (cppm) 6.2.x, 6.3.x before 6.3.6, and 6.4.x before 6.4.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-11-25\n- Last Modified Date: 2018-12-18" } ] }, { "Unnamed: 0": "CVE-2019-1383", "mod_date": "2019-11-12", "pub_date": "2019-11-12", "cvss": 4.6, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists when the windows data sharing service improperly handles file operations, aka 'windows data sharing service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1379, cve-2019-1417.", "access_authentication": "NONE", "access_complexity": "UNKNOWN", "access_vector": "UNKNOWN", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists when the windows data sharing service improperly handles file operations, aka 'windows data sharing service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1379, cve-2019-1417.\n- Access Authentication: NONE\n- Access Complexity: UNKNOWN\n- Access Vector: UNKNOWN\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/NONE\n- Published Date: 2019-11-12\n- Last Modified Date: 2019-11-12" } ] }, { "Unnamed: 0": "CVE-2007-4953", "mod_date": "2017-09-29", "pub_date": "2007-09-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in simpcms allows remote attackers to execute arbitrary sql commands via the keyword parameter in a search site action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in simpcms allows remote attackers to execute arbitrary sql commands via the keyword parameter in a search site action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-09-18\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-6874", "mod_date": "2017-09-29", "pub_date": "2009-07-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in asp siteware autodealer 1 and 2 allow remote attackers to execute arbitrary sql commands via the itype parameter in (1) auto1/type.asp or (2) auto2/type.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in asp siteware autodealer 1 and 2 allow remote attackers to execute arbitrary sql commands via the itype parameter in (1) auto1/type.asp or (2) auto2/type.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-15658", "mod_date": "2019-08-30", "pub_date": "2019-08-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "connect-pg-simple before 6.0.1 allows sql injection if tablename or schemaname is untrusted data.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: connect-pg-simple before 6.0.1 allows sql injection if tablename or schemaname is untrusted data.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-26\n- Last Modified Date: 2019-08-30" } ] }, { "Unnamed: 0": "CVE-2017-4974", "mod_date": "2017-06-27", "pub_date": "2017-06-13", "cvss": 4.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in cloud foundry foundation cf-release versions prior to v258; uaa release 2.x versions prior to v2.7.4.15, 3.6.x versions prior to v3.6.9, 3.9.x versions prior to v3.9.11, and other versions prior to v3.16.0; and uaa bosh release (uaa-release) 13.x versions prior to v13.13, 24.x versions prior to v24.8, and other versions prior to v30.1. an authorized user can use a blind sql injection attack to query the contents of the uaa database, aka \"blind sql injection with privileged uaa endpoints.\"", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in cloud foundry foundation cf-release versions prior to v258; uaa release 2.x versions prior to v2.7.4.15, 3.6.x versions prior to v3.6.9, 3.9.x versions prior to v3.9.11, and other versions prior to v3.16.0; and uaa bosh release (uaa-release) 13.x versions prior to v13.13, 24.x versions prior to v24.8, and other versions prior to v30.1. an authorized user can use a blind sql injection attack to query the contents of the uaa database, aka \"blind sql injection with privileged uaa endpoints.\"\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-06-13\n- Last Modified Date: 2017-06-27" } ] }, { "Unnamed: 0": "CVE-2008-6155", "mod_date": "2017-08-17", "pub_date": "2009-02-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in hispah text links ads 1.1 allows remote attackers to execute arbitrary sql commands via the idtl parameter in a buy action. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in hispah text links ads 1.1 allows remote attackers to execute arbitrary sql commands via the idtl parameter in a buy action. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-16\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2018-8155", "mod_date": "2018-06-05", "pub_date": "2018-05-09", "cvss": 3.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft sharepoint. this cve id is unique from cve-2018-8149, cve-2018-8156, cve-2018-8168.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft sharepoint. this cve id is unique from cve-2018-8149, cve-2018-8156, cve-2018-8168.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2018-05-09\n- Last Modified Date: 2018-06-05" } ] }, { "Unnamed: 0": "CVE-2006-5829", "mod_date": "2018-10-17", "pub_date": "2006-11-10", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in all in one control panel (aiocp) 1.3.007 and earlier allow remote attackers to execute arbitrary sql commands via the (1) choosed_language parameter to (a) cp_dpage.php, (b) cp_news.php, (c) cp_forum_view.php, (d) cp_edit_user.php, (e) cp_newsletter.php, (f) cp_links.php, (g) cp_contact_us.php, (h) cp_login.php, and (i) cp_codice_fiscale.php in public/code/; (2) news_category parameter to public/code/cp_news.php; (3) nlmsg_nlcatid parameter to public/code/cp_newsletter.php; (4) links_category parameter to public/code/cp_links.php; (5) product_category_id parameter to public/code/cp_show_ec_products.php; (6) order_field parameter to public/code/cp_show_ec_products.php; (7) firstrow parameter to public/code/cp_users_online.php; and (8) orderdir parameter to public/code/cp_links_search.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in all in one control panel (aiocp) 1.3.007 and earlier allow remote attackers to execute arbitrary sql commands via the (1) choosed_language parameter to (a) cp_dpage.php, (b) cp_news.php, (c) cp_forum_view.php, (d) cp_edit_user.php, (e) cp_newsletter.php, (f) cp_links.php, (g) cp_contact_us.php, (h) cp_login.php, and (i) cp_codice_fiscale.php in public/code/; (2) news_category parameter to public/code/cp_news.php; (3) nlmsg_nlcatid parameter to public/code/cp_newsletter.php; (4) links_category parameter to public/code/cp_links.php; (5) product_category_id parameter to public/code/cp_show_ec_products.php; (6) order_field parameter to public/code/cp_show_ec_products.php; (7) firstrow parameter to public/code/cp_users_online.php; and (8) orderdir parameter to public/code/cp_links_search.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-11-10\n- Last Modified Date: 2018-10-17" } ] }, { "Unnamed: 0": "CVE-2008-5635", "mod_date": "2017-09-29", "pub_date": "2008-12-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in account.asp in active membership 2.0 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters, possibly related to start.asp. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in account.asp in active membership 2.0 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters, possibly related to start.asp. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-3217", "mod_date": "2017-09-19", "pub_date": "2009-09-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the admin module in iwiccle 1.01 allows remote attackers to execute arbitrary sql commands via the member_id parameter in an edit_user action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the admin module in iwiccle 1.01 allows remote attackers to execute arbitrary sql commands via the member_id parameter in an edit_user action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-16\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2018-20505", "mod_date": "2019-06-19", "pub_date": "2019-04-03", "cvss": 5.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sqlite 3.25.2, when queries are run on a table with a malformed primary key, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary sql statements (such as in certain websql use cases).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sqlite 3.25.2, when queries are run on a table with a malformed primary key, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary sql statements (such as in certain websql use cases).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/PARTIAL\n- Published Date: 2019-04-03\n- Last Modified Date: 2019-06-19" } ] }, { "Unnamed: 0": "CVE-2009-3659", "mod_date": "2017-09-19", "pub_date": "2009-10-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in file/stats.php in bs counter 2.5.3 allows remote attackers to execute arbitrary sql commands via the page parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in file/stats.php in bs counter 2.5.3 allows remote attackers to execute arbitrary sql commands via the page parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-10-11\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-0253", "mod_date": "2018-10-15", "pub_date": "2008-01-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in full_text.php in binn sbuilder allows remote attackers to execute arbitrary sql commands via the nid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in full_text.php in binn sbuilder allows remote attackers to execute arbitrary sql commands via the nid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-15\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2019-0623", "mod_date": "2019-03-06", "pub_date": "2019-03-05", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-03-05\n- Last Modified Date: 2019-03-06" } ] }, { "Unnamed: 0": "CVE-2009-2018", "mod_date": "2017-09-29", "pub_date": "2009-06-09", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/index.php in jared eckersley mycars, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the authuserid parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/index.php in jared eckersley mycars, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the authuserid parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-06-09\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-1850", "mod_date": "2017-09-29", "pub_date": "2009-06-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in phpbugtracker 1.0.3 allows remote attackers to execute arbitrary sql commands via the password parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in phpbugtracker 1.0.3 allows remote attackers to execute arbitrary sql commands via the password parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-06-01\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-2128", "mod_date": "2009-06-22", "pub_date": "2009-06-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in close_bug.php in elvin before 1.2.1 allows remote attackers to execute arbitrary sql commands via the title (aka subject) field.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in close_bug.php in elvin before 1.2.1 allows remote attackers to execute arbitrary sql commands via the title (aka subject) field.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-06-19\n- Last Modified Date: 2009-06-22" } ] }, { "Unnamed: 0": "CVE-2010-4944", "mod_date": "2017-08-29", "pub_date": "2011-10-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the elite experts (com_elite_experts) component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a showexpertprofiledetailed action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the elite experts (com_elite_experts) component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a showexpertprofiledetailed action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-10-09\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2014-4644", "mod_date": "2015-01-12", "pub_date": "2014-06-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in superlinks.php in the superlinks plugin 1.4-2 for cacti allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in superlinks.php in the superlinks plugin 1.4-2 for cacti allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-06-25\n- Last Modified Date: 2015-01-12" } ] }, { "Unnamed: 0": "CVE-2013-2627", "mod_date": "2013-12-23", "pub_date": "2013-12-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in action.php in leed (light feed), possibly before 1.5 stable, allows remote attackers to execute arbitrary sql commands via the id parameter in a removefolder action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in action.php in leed (light feed), possibly before 1.5 stable, allows remote attackers to execute arbitrary sql commands via the id parameter in a removefolder action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-12-21\n- Last Modified Date: 2013-12-23" } ] }, { "Unnamed: 0": "CVE-2009-1499", "mod_date": "2017-09-29", "pub_date": "2009-05-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the mailto (aka com_mailto) component in joomla! allows remote attackers to execute arbitrary sql commands via the article parameter in index.php. note: securityfocus states that this issue has been disputed by the vendor.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the mailto (aka com_mailto) component in joomla! allows remote attackers to execute arbitrary sql commands via the article parameter in index.php. note: securityfocus states that this issue has been disputed by the vendor.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-01\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-1699", "mod_date": "2019-10-09", "pub_date": "2018-08-24", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "ibm maximo asset management 7.6 through 7.6.3 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 145968.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ibm maximo asset management 7.6 through 7.6.3 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 145968.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-08-24\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2015-9323", "mod_date": "2019-08-21", "pub_date": "2019-08-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the 404-to-301 plugin before 2.0.3 for wordpress has sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the 404-to-301 plugin before 2.0.3 for wordpress has sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-16\n- Last Modified Date: 2019-08-21" } ] }, { "Unnamed: 0": "CVE-2016-6769", "mod_date": "2017-01-19", "pub_date": "2017-01-12", "cvss": 2.1, "cwe_code": 284, "cwe_name": " Improper Access Control", "summary": "an elevation of privilege vulnerability in smart lock could enable a local malicious user to access smart lock settings without a pin. this issue is rated as moderate because it first requires physical access to an unlocked device where smart lock was the last settings pane accessed by the user. product: android. versions: 5.0.2, 5.1.1, 6.0, 6.0.1. android id: a-29055171.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Access Control." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 284:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 2.1\n- CWE Name: Improper Access Control\n- Summary: an elevation of privilege vulnerability in smart lock could enable a local malicious user to access smart lock settings without a pin. this issue is rated as moderate because it first requires physical access to an unlocked device where smart lock was the last settings pane accessed by the user. product: android. versions: 5.0.2, 5.1.1, 6.0, 6.0.1. android id: a-29055171.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2017-01-12\n- Last Modified Date: 2017-01-19" } ] }, { "Unnamed: 0": "CVE-2015-9390", "mod_date": "2019-09-23", "pub_date": "2019-09-20", "cvss": 4.0, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "the admin-management-xtended plugin before 2.4.0.1 for wordpress has privilege escalation because wp_ajax functions are mishandled.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.0\n- CWE Name: Improper Privilege Management\n- Summary: the admin-management-xtended plugin before 2.4.0.1 for wordpress has privilege escalation because wp_ajax functions are mishandled.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2019-09-20\n- Last Modified Date: 2019-09-23" } ] }, { "Unnamed: 0": "CVE-2010-0721", "mod_date": "2017-08-17", "pub_date": "2010-02-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in news.php in auktionshaus gelb 3.0 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in news.php in auktionshaus gelb 3.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-02-26\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2009-3439", "mod_date": "2018-10-10", "pub_date": "2009-09-28", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in open source security information management (ossim) before 2.1.2 allow remote authenticated users to execute arbitrary sql commands via the id_document parameter to (1) repository_document.php, (2) repository_links.php, and (3) repository_editdocument.php in repository/; the (4) group parameter to policy/getpolicy.php; the name parameter to (5) host/newhostgroupform.php and (6) net/modifynetform.php; and unspecified other vectors related to the policy menu.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in open source security information management (ossim) before 2.1.2 allow remote authenticated users to execute arbitrary sql commands via the id_document parameter to (1) repository_document.php, (2) repository_links.php, and (3) repository_editdocument.php in repository/; the (4) group parameter to policy/getpolicy.php; the name parameter to (5) host/newhostgroupform.php and (6) net/modifynetform.php; and unspecified other vectors related to the policy menu.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-28\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2010-4898", "mod_date": "2012-05-14", "pub_date": "2011-10-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the gantry (com_gantry) component 3.0.10 for joomla! allows remote attackers to execute arbitrary sql commands via the moduleid parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the gantry (com_gantry) component 3.0.10 for joomla! allows remote attackers to execute arbitrary sql commands via the moduleid parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-10-08\n- Last Modified Date: 2012-05-14" } ] }, { "Unnamed: 0": "CVE-2008-0519", "mod_date": "2017-09-29", "pub_date": "2008-01-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the atapin jokes (com_jokes) 1.0 component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the cat parameter in a catview action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the atapin jokes (com_jokes) 1.0 component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the cat parameter in a catview action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-31\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-4837", "mod_date": "2016-12-06", "pub_date": "2016-08-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the seed coupon plugin before 1.6 for ec-cube allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the seed coupon plugin before 1.6 for ec-cube allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-08-01\n- Last Modified Date: 2016-12-06" } ] }, { "Unnamed: 0": "CVE-2008-3749", "mod_date": "2017-09-29", "pub_date": "2008-08-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in tr.php in yourfreeworld banner management script allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in tr.php in yourfreeworld banner management script allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-08-21\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-4846", "mod_date": "2017-08-29", "pub_date": "2011-09-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in view_item.php in mh products pay pal shop digital allows remote attackers to execute arbitrary sql commands via the itemid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in view_item.php in mh products pay pal shop digital allows remote attackers to execute arbitrary sql commands via the itemid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-09-27\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2017-17573", "mod_date": "2017-12-20", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "fs ebay clone 1.0 has sql injection via the product.php id parameter, or the search.php category_id or sub_category_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: fs ebay clone 1.0 has sql injection via the product.php id parameter, or the search.php category_id or sub_category_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-20" } ] }, { "Unnamed: 0": "CVE-2012-0939", "mod_date": "2017-08-29", "pub_date": "2014-08-14", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in testlink 1.8.5b and earlier allow remote authenticated users with the requirement view permission to execute arbitrary sql commands via the req_spec_id parameter to (1) reqspecanalyse.php, (2) reqspecprint.php, or (3) reqspecview.php in requirements/. note: some of these details are obtained from third party information.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in testlink 1.8.5b and earlier allow remote authenticated users with the requirement view permission to execute arbitrary sql commands via the req_spec_id parameter to (1) reqspecanalyse.php, (2) reqspecprint.php, or (3) reqspecview.php in requirements/. note: some of these details are obtained from third party information.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-08-14\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2008-1790", "mod_date": "2017-09-29", "pub_date": "2008-04-15", "cvss": 6.5, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "unrestricted file upload vulnerability in iscripts socialware allows remote authenticated administrators to upload arbitrary files via a crafted logo file in the \"manage settings\" functionality. note: remote exploitation is facilitated by a separate sql injection vulnerability.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: unrestricted file upload vulnerability in iscripts socialware allows remote authenticated administrators to upload arbitrary files via a crafted logo file in the \"manage settings\" functionality. note: remote exploitation is facilitated by a separate sql injection vulnerability.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-15\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-6234", "mod_date": "2018-10-11", "pub_date": "2009-02-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the com_musica module in joomla! and mambo allows remote attackers to execute arbitrary sql commands via the id parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the com_musica module in joomla! and mambo allows remote attackers to execute arbitrary sql commands via the id parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-21\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2009-0726", "mod_date": "2017-09-29", "pub_date": "2009-02-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the gigcalendar (com_gigcal) component 1.0 for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the gigcal_gigs_id parameter in a details action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the gigcalendar (com_gigcal) component 1.0 for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the gigcal_gigs_id parameter in a details action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-10645", "mod_date": "2019-10-03", "pub_date": "2018-05-02", "cvss": 7.2, "cwe_code": 732, "cwe_name": " Incorrect Permission Assignment for Critical Resource", "summary": "golden frog vyprvpn 2.12.1.8015 for windows suffers from a system privilege escalation vulnerability through the \"vyprvpn\" service. this service establishes a netnamedpipe endpoint that allows applications to connect and call publicly exposed methods. the \"setproperty\" method allows an attacker to configure the \"additionalopenvpnparameters\" property and control the openvpn command line. using the openvpn \"plugin\" parameter, an attacker may specify a dynamic library plugin that should run for every new vpn connection attempt. this plugin will execute code in the context of the system user. this attack may be conducted using \"vyprvpn free\" account credentials and the vyprvpn desktop client.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 732:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Incorrect Permission Assignment for Critical Resource\n- Summary: golden frog vyprvpn 2.12.1.8015 for windows suffers from a system privilege escalation vulnerability through the \"vyprvpn\" service. this service establishes a netnamedpipe endpoint that allows applications to connect and call publicly exposed methods. the \"setproperty\" method allows an attacker to configure the \"additionalopenvpnparameters\" property and control the openvpn command line. using the openvpn \"plugin\" parameter, an attacker may specify a dynamic library plugin that should run for every new vpn connection attempt. this plugin will execute code in the context of the system user. this attack may be conducted using \"vyprvpn free\" account credentials and the vyprvpn desktop client.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-05-02\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2015-1423", "mod_date": "2017-09-08", "pub_date": "2015-01-29", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in gecko cms 2.2 and 2.3 allow remote administrators to execute arbitrary sql commands via the (1) jak_delete_log[] or (2) ssp parameter to admin/index.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in gecko cms 2.2 and 2.3 allow remote administrators to execute arbitrary sql commands via the (1) jak_delete_log[] or (2) ssp parameter to admin/index.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-29\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2017-12121", "mod_date": "2018-06-15", "pub_date": "2018-05-14", "cvss": 9.0, "cwe_code": 78, "cwe_name": " Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", "summary": "an exploitable command injection vulnerability exists in the web server functionality of moxa edr-810 v4.1 build 17030317. a specially crafted http post can cause a privilege escalation resulting in root shell. an attacker can inject os commands into the rsakey\\_name= parm in the \"/goform/webrsakeygen\" uri to trigger this vulnerability.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 78:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.0\n- CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\n- Summary: an exploitable command injection vulnerability exists in the web server functionality of moxa edr-810 v4.1 build 17030317. a specially crafted http post can cause a privilege escalation resulting in root shell. an attacker can inject os commands into the rsakey\\_name= parm in the \"/goform/webrsakeygen\" uri to trigger this vulnerability.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-05-14\n- Last Modified Date: 2018-06-15" } ] }, { "Unnamed: 0": "CVE-2009-0741", "mod_date": "2018-10-10", "pub_date": "2009-02-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in login.asp in craft silicon banking@home 2.1 and earlier allows remote attackers to execute arbitrary sql commands via the loginname parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in login.asp in craft silicon banking@home 2.1 and earlier allows remote attackers to execute arbitrary sql commands via the loginname parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-25\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2010-5017", "mod_date": "2017-08-29", "pub_date": "2011-11-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in stats.php in elite gaming ladders 3.0 allows remote attackers to execute arbitrary sql commands via the account parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in stats.php in elite gaming ladders 3.0 allows remote attackers to execute arbitrary sql commands via the account parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-02\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2017-13707", "mod_date": "2019-10-03", "pub_date": "2017-08-27", "cvss": 10.0, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "privilege escalation in replibit backup manager earlier than version 2017.08.04 allows attackers to gain root privileges via sudo command execution. the vi program can be accessed through sudo, in order to navigate the filesystem and modify a critical file such as /etc/passwd.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 10.0\n- CWE Name: Improper Privilege Management\n- Summary: privilege escalation in replibit backup manager earlier than version 2017.08.04 allows attackers to gain root privileges via sudo command execution. the vi program can be accessed through sudo, in order to navigate the filesystem and modify a critical file such as /etc/passwd.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-08-27\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-1000857", "mod_date": "2019-01-07", "pub_date": "2018-12-20", "cvss": 9.0, "cwe_code": 22, "cwe_name": " Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "summary": "log-user-session version 0.7 and earlier contains a directory traversal vulnerability in main suid-binary /usr/local/bin/log-user-session that can result in user to root privilege escalation. this attack appear to be exploitable via malicious unprivileged user executes the vulnerable binary/(remote) environment variable manipulation similar shell-shock also possible.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 22:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.0\n- CWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\n- Summary: log-user-session version 0.7 and earlier contains a directory traversal vulnerability in main suid-binary /usr/local/bin/log-user-session that can result in user to root privilege escalation. this attack appear to be exploitable via malicious unprivileged user executes the vulnerable binary/(remote) environment variable manipulation similar shell-shock also possible.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-12-20\n- Last Modified Date: 2019-01-07" } ] }, { "Unnamed: 0": "CVE-2017-15964", "mod_date": "2017-11-17", "pub_date": "2017-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "job board script software allows sql injection via the path_info to a /job-details uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: job board script software allows sql injection via the path_info to a /job-details uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-29\n- Last Modified Date: 2017-11-17" } ] }, { "Unnamed: 0": "CVE-2019-1330", "mod_date": "2019-10-11", "pub_date": "2019-10-10", "cvss": 4.0, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an elevation of privilege vulnerability exists in microsoft sharepoint, aka 'microsoft sharepoint elevation of privilege vulnerability'. this cve id is unique from cve-2019-1329.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.0\n- CWE Name: Improper Privilege Management\n- Summary: an elevation of privilege vulnerability exists in microsoft sharepoint, aka 'microsoft sharepoint elevation of privilege vulnerability'. this cve id is unique from cve-2019-1329.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2019-10-10\n- Last Modified Date: 2019-10-11" } ] }, { "Unnamed: 0": "CVE-2017-1087", "mod_date": "2019-10-03", "pub_date": "2017-11-16", "cvss": 4.6, "cwe_code": 22, "cwe_name": " Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "summary": "in freebsd 10.x before 10.4-stable, 10.4-release-p3, and 10.3-release-p24 named paths are globally scoped, meaning a process located in one jail can read and modify the content of posix shared memory objects created by a process in another jail or the host system. as a result, a malicious user that has access to a jailed system is able to abuse shared memory by injecting malicious content in the shared memory region. this memory region might be executed by applications trusting the shared memory, like squid. this issue could lead to a denial of service or local privilege escalation.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 22:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\n- Summary: in freebsd 10.x before 10.4-stable, 10.4-release-p3, and 10.3-release-p24 named paths are globally scoped, meaning a process located in one jail can read and modify the content of posix shared memory objects created by a process in another jail or the host system. as a result, a malicious user that has access to a jailed system is able to abuse shared memory by injecting malicious content in the shared memory region. this memory region might be executed by applications trusting the shared memory, like squid. this issue could lead to a denial of service or local privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-11-16\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2008-6594", "mod_date": "2019-03-12", "pub_date": "2009-04-03", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the cm_rdfexport extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the cm_rdfexport extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-03\n- Last Modified Date: 2019-03-12" } ] }, { "Unnamed: 0": "CVE-2008-5213", "mod_date": "2017-09-29", "pub_date": "2008-11-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in featured_article.php in aj article 1.0 allows remote attackers to execute arbitrary sql commands via the artid parameter in a search detail action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in featured_article.php in aj article 1.0 allows remote attackers to execute arbitrary sql commands via the artid parameter in a search detail action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2006-0403", "mod_date": "2018-10-19", "pub_date": "2006-01-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in e-moblog 1.3 allow remote attackers to execute arbitrary sql commands via the (1) monthy parameter to index.php or (2) login parameter to admin/index.php. note: some sources have reported item 1 as involving the \"monthly\" parameter, but this is incorrect.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in e-moblog 1.3 allow remote attackers to execute arbitrary sql commands via the (1) monthy parameter to index.php or (2) login parameter to admin/index.php. note: some sources have reported item 1 as involving the \"monthly\" parameter, but this is incorrect.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-01-25\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2015-5049", "mod_date": "2016-11-28", "pub_date": "2016-01-01", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the api in ibm openpages grc platform 7.0 before 7.0.0.4 if3 and 7.1 before 7.1.0.1 if6 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the api in ibm openpages grc platform 7.0 before 7.0.0.4 if3 and 7.1 before 7.1.0.1 if6 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-01-01\n- Last Modified Date: 2016-11-28" } ] }, { "Unnamed: 0": "CVE-2008-6992", "mod_date": "2009-08-19", "pub_date": "2009-08-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "greensql firewall (greensql-fw), possibly before 0.9.2 or 0.9.4, allows remote attackers to bypass the sql injection protection mechanism via a where clause containing an expression such as \"x=y=z\", which is successfully parsed by mysql.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: greensql firewall (greensql-fw), possibly before 0.9.2 or 0.9.4, allows remote attackers to bypass the sql injection protection mechanism via a where clause containing an expression such as \"x=y=z\", which is successfully parsed by mysql.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-08-19\n- Last Modified Date: 2009-08-19" } ] }, { "Unnamed: 0": "CVE-2019-11977", "mod_date": "2019-06-07", "pub_date": "2019-06-05", "cvss": 9.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection code execution vulnerability was identified in hpe intelligent management center (imc) plat earlier than version 7.3 e0506p09.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 9.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection code execution vulnerability was identified in hpe intelligent management center (imc) plat earlier than version 7.3 e0506p09.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-06-05\n- Last Modified Date: 2019-06-07" } ] }, { "Unnamed: 0": "CVE-2010-2319", "mod_date": "2010-06-18", "pub_date": "2010-06-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in idevspot textads 2.08 allows remote attackers to execute arbitrary sql commands via the page parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in idevspot textads 2.08 allows remote attackers to execute arbitrary sql commands via the page parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-06-17\n- Last Modified Date: 2010-06-18" } ] }, { "Unnamed: 0": "CVE-2009-4985", "mod_date": "2017-09-19", "pub_date": "2010-08-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in browse.php in accessories me php affiliate script 1.4 allows remote attackers to execute arbitrary sql commands via the go parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in browse.php in accessories me php affiliate script 1.4 allows remote attackers to execute arbitrary sql commands via the go parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-08-25\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2009-4540", "mod_date": "2017-09-19", "pub_date": "2010-01-04", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in page.php in mini cms 1.0.1 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in page.php in mini cms 1.0.1 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-04\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2009-2894", "mod_date": "2017-08-17", "pub_date": "2009-08-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in ebay clone 2009 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to product_desc.php, and the cid parameter to (2) showcategory.php and (3) gallery.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in ebay clone 2009 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to product_desc.php, and the cid parameter to (2) showcategory.php and (3) gallery.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-08-20\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2015-2527", "mod_date": "2019-05-14", "pub_date": "2015-09-09", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the process-initialization implementation in win32k.sys in the kernel-mode drivers in microsoft windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the process-initialization implementation in win32k.sys in the kernel-mode drivers in microsoft windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-09-09\n- Last Modified Date: 2019-05-14" } ] }, { "Unnamed: 0": "CVE-2007-4966", "mod_date": "2017-10-19", "pub_date": "2007-09-18", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in www/people/editprofile.php in gforge 4.6b2 and earlier allows remote attackers to execute arbitrary sql commands via the skill_delete[] parameter. an attacker may require credentials to exploit this. \r\n\r\ngforge's configuration setting $sys_use_people must be enabled. this may not be the default setting contingent upon the environment in which it is installed.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in www/people/editprofile.php in gforge 4.6b2 and earlier allows remote attackers to execute arbitrary sql commands via the skill_delete[] parameter. an attacker may require credentials to exploit this. \r\n\r\ngforge's configuration setting $sys_use_people must be enabled. this may not be the default setting contingent upon the environment in which it is installed.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-09-18\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2014-4076", "mod_date": "2018-10-12", "pub_date": "2014-11-11", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft windows server 2003 sp2 allows local users to gain privileges via a crafted ioctl call to (1) tcpip.sys or (2) tcpip6.sys, aka \"tcp/ip elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft windows server 2003 sp2 allows local users to gain privileges via a crafted ioctl call to (1) tcpip.sys or (2) tcpip6.sys, aka \"tcp/ip elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2014-11-11\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2017-9436", "mod_date": "2017-06-13", "pub_date": "2017-06-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "teampass before 2.1.27.4 is vulnerable to a sql injection in users.queries.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: teampass before 2.1.27.4 is vulnerable to a sql injection in users.queries.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-06-05\n- Last Modified Date: 2017-06-13" } ] }, { "Unnamed: 0": "CVE-2009-4889", "mod_date": "2017-09-19", "pub_date": "2010-06-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in books.php in the book panel (book_panel) module for php-fusion allows remote attackers to execute arbitrary sql commands via the bookid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in books.php in the book panel (book_panel) module for php-fusion allows remote attackers to execute arbitrary sql commands via the bookid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-06-11\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2014-2081", "mod_date": "2015-01-26", "pub_date": "2014-10-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the login in web_reports/cgi-bin/infostation.cgi in innovative vtls-virtua before 2013.2.4 and 2014.x before 2014.1.1 allow remote attackers to execute arbitrary sql commands via the (1) username or (2) password parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the login in web_reports/cgi-bin/infostation.cgi in innovative vtls-virtua before 2013.2.4 and 2014.x before 2014.1.1 allow remote attackers to execute arbitrary sql commands via the (1) username or (2) password parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-10-20\n- Last Modified Date: 2015-01-26" } ] }, { "Unnamed: 0": "CVE-2007-6291", "mod_date": "2017-08-08", "pub_date": "2007-12-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in abm.aspx in xigla absolute banner manager .net 4.0 allows remote attackers to execute arbitrary sql commands via the z parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in abm.aspx in xigla absolute banner manager .net 4.0 allows remote attackers to execute arbitrary sql commands via the z parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-12-10\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2017-17999", "mod_date": "2018-02-09", "pub_date": "2018-01-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in rise ultimate project manager 1.9 allows remote attackers to execute arbitrary sql commands via the search parameter to index.php/knowledge_base/get_article_suggestion/.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in rise ultimate project manager 1.9 allows remote attackers to execute arbitrary sql commands via the search parameter to index.php/knowledge_base/get_article_suggestion/.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-23\n- Last Modified Date: 2018-02-09" } ] }, { "Unnamed: 0": "CVE-2006-4039", "mod_date": "2018-10-17", "pub_date": "2006-08-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in eintragen.php in gaestechaos 0.2 and earlier allow remote attackers to execute arbitrary sql commands via the (1) gastname, (2) gastwohnort, or (3) gasteintrag parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in eintragen.php in gaestechaos 0.2 and earlier allow remote attackers to execute arbitrary sql commands via the (1) gastname, (2) gastwohnort, or (3) gasteintrag parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-08-09\n- Last Modified Date: 2018-10-17" } ] }, { "Unnamed: 0": "CVE-2009-4620", "mod_date": "2017-09-19", "pub_date": "2010-01-18", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the joomloc (com_joomloc) component 1.0 for joomla allows remote attackers to execute arbitrary sql commands via the id parameter in an edit task to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the joomloc (com_joomloc) component 1.0 for joomla allows remote attackers to execute arbitrary sql commands via the id parameter in an edit task to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-18\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-6013", "mod_date": "2017-08-08", "pub_date": "2009-01-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in freeway before 1.4.3.210 allow remote attackers to execute arbitrary sql commands via unspecified vectors involving the (1) advanced search result and (2) service resource pages.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in freeway before 1.4.3.210 allow remote attackers to execute arbitrary sql commands via unspecified vectors involving the (1) advanced search result and (2) service resource pages.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-01-30\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2008-5307", "mod_date": "2017-09-29", "pub_date": "2008-12-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/index.php in pg roommate finder solution allows remote attackers to execute arbitrary sql commands via the login_lg parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/index.php in pg roommate finder solution allows remote attackers to execute arbitrary sql commands via the login_lg parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-02\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-4979", "mod_date": "2010-08-25", "pub_date": "2010-08-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in search.php in photokorn gallery 1.81 and earlier allow remote attackers to execute arbitrary sql commands via the (1) where[], (2) sort, (3) order, and (4) match parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in search.php in photokorn gallery 1.81 and earlier allow remote attackers to execute arbitrary sql commands via the (1) where[], (2) sort, (3) order, and (4) match parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-08-25\n- Last Modified Date: 2010-08-25" } ] }, { "Unnamed: 0": "CVE-2003-1530", "mod_date": "2018-10-19", "pub_date": "2003-12-31", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in privmsg.php in phpbb 2.0.3 and earlier allows remote attackers to execute arbitrary sql commands via the mark[] parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in privmsg.php in phpbb 2.0.3 and earlier allows remote attackers to execute arbitrary sql commands via the mark[] parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2003-12-31\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2012-5289", "mod_date": "2017-08-29", "pub_date": "2012-10-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in plogger 1.0 rc1 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) index.php or (2) gallery.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in plogger 1.0 rc1 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) index.php or (2) gallery.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-10-04\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2017-14507", "mod_date": "2017-10-10", "pub_date": "2017-09-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the content timeline plugin 4.4.2 for wordpress allow remote attackers to execute arbitrary sql commands via the (1) timeline parameter in content_timeline_class.php; or the id parameter to (2) pages/content_timeline_edit.php or (3) pages/content_timeline_index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the content timeline plugin 4.4.2 for wordpress allow remote attackers to execute arbitrary sql commands via the (1) timeline parameter in content_timeline_class.php; or the id parameter to (2) pages/content_timeline_edit.php or (3) pages/content_timeline_index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-09-29\n- Last Modified Date: 2017-10-10" } ] }, { "Unnamed: 0": "CVE-2010-2688", "mod_date": "2017-08-17", "pub_date": "2010-07-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in detail.asp in site2nite boat classifieds allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in detail.asp in site2nite boat classifieds allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-12\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2017-15975", "mod_date": "2017-11-17", "pub_date": "2017-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "vastal i-tech dating zone 0.9.9 allows sql injection via the 'product_id' to add_to_cart.php, a different vulnerability than cve-2008-4461.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: vastal i-tech dating zone 0.9.9 allows sql injection via the 'product_id' to add_to_cart.php, a different vulnerability than cve-2008-4461.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-29\n- Last Modified Date: 2017-11-17" } ] }, { "Unnamed: 0": "CVE-2008-6156", "mod_date": "2017-09-29", "pub_date": "2009-02-16", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in editcampaign.php in adman 1.1.20070907 allows remote authenticated users to execute arbitrary sql commands via the campaignid parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in editcampaign.php in adman 1.1.20070907 allows remote authenticated users to execute arbitrary sql commands via the campaignid parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-16\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2010-4736", "mod_date": "2011-09-22", "pub_date": "2011-02-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in eco.asp in gatesoft docusafe 4.1.0 and 4.1.2 allows remote attackers to execute arbitrary sql commands via the eco_id parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in eco.asp in gatesoft docusafe 4.1.0 and 4.1.2 allows remote attackers to execute arbitrary sql commands via the eco_id parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-02-16\n- Last Modified Date: 2011-09-22" } ] }, { "Unnamed: 0": "CVE-2007-5371", "mod_date": "2018-10-15", "pub_date": "2007-10-11", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in mutate_content.dynamic.php in modx 0.9.6 allow remote attackers to execute arbitrary sql commands via the (1) documentdirty or (2) modvariables parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in mutate_content.dynamic.php in modx 0.9.6 allow remote attackers to execute arbitrary sql commands via the (1) documentdirty or (2) modvariables parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-10-11\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2019-1010307", "mod_date": "2019-07-18", "pub_date": "2019-07-15", "cvss": 3.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "glpi glpi product 9.3.1 is affected by: cross site scripting (xss). the impact is: all dropdown values are vulnerable to xss leading to privilege escalation and executing js on admin. the component is: /glpi/ajax/getdropdownvalue.php. the attack vector is: 1- user create a ticket , 2- admin opens another ticket and click on the \"link tickets\" feature, 3- a request to the endpoint fetches js and executes it.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: glpi glpi product 9.3.1 is affected by: cross site scripting (xss). the impact is: all dropdown values are vulnerable to xss leading to privilege escalation and executing js on admin. the component is: /glpi/ajax/getdropdownvalue.php. the attack vector is: 1- user create a ticket , 2- admin opens another ticket and click on the \"link tickets\" feature, 3- a request to the endpoint fetches js and executes it.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2019-07-15\n- Last Modified Date: 2019-07-18" } ] }, { "Unnamed: 0": "CVE-2008-6788", "mod_date": "2017-09-29", "pub_date": "2009-05-04", "cvss": 5.1, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in minddezign photo gallery 2.2, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the id parameter in an info action to index.php.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.1\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in minddezign photo gallery 2.2, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the id parameter in an info action to index.php.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-05-04\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2006-1826", "mod_date": "2018-10-18", "pub_date": "2006-04-18", "cvss": 4.3, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "multiple cross-site scripting (xss) vulnerabilities in snipe gallery 3.1.4 and earlier allow remote attackers to inject arbitrary web script or html via the (1) gallery_id parameter in view.php, (2) keyword parameter in search.php, and (3) image_id parameter in image.php. note: it is possible that vectors 1 and 3 are resultant from sql injection.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.3\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: multiple cross-site scripting (xss) vulnerabilities in snipe gallery 3.1.4 and earlier allow remote attackers to inject arbitrary web script or html via the (1) gallery_id parameter in view.php, (2) keyword parameter in search.php, and (3) image_id parameter in image.php. note: it is possible that vectors 1 and 3 are resultant from sql injection.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2006-04-18\n- Last Modified Date: 2018-10-18" } ] }, { "Unnamed: 0": "CVE-2019-1173", "mod_date": "2019-08-19", "pub_date": "2019-08-14", "cvss": 4.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists in the way that the psmserviceexthost.dll handles objects in memory, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1174, cve-2019-1175, cve-2019-1177, cve-2019-1178, cve-2019-1179, cve-2019-1180, cve-2019-1184, cve-2019-1186.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists in the way that the psmserviceexthost.dll handles objects in memory, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1174, cve-2019-1175, cve-2019-1177, cve-2019-1178, cve-2019-1179, cve-2019-1180, cve-2019-1184, cve-2019-1186.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-14\n- Last Modified Date: 2019-08-19" } ] }, { "Unnamed: 0": "CVE-2008-4879", "mod_date": "2017-09-29", "pub_date": "2008-11-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in prod.php in maran php shop allows remote attackers to execute arbitrary sql commands via the cat parameter, a different vector than cve-2008-4880.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in prod.php in maran php shop allows remote attackers to execute arbitrary sql commands via the cat parameter, a different vector than cve-2008-4880.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-04\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-10232", "mod_date": "2018-05-04", "pub_date": "2018-04-04", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the qualcomm video driver. product: android. versions: android kernel. android id: a-34386696. references: qc-cr#1024872.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the qualcomm video driver. product: android. versions: android kernel. android id: a-34386696. references: qc-cr#1024872.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-04-04\n- Last Modified Date: 2018-05-04" } ] }, { "Unnamed: 0": "CVE-2009-2640", "mod_date": "2018-01-11", "pub_date": "2009-07-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in cgi/admin.cgi in interlogy profile manager basic allow remote attackers to execute arbitrary sql commands via a pmadm cookie in (1) an edittemp action or (2) a users action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in cgi/admin.cgi in interlogy profile manager basic allow remote attackers to execute arbitrary sql commands via a pmadm cookie in (1) an edittemp action or (2) a users action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-28\n- Last Modified Date: 2018-01-11" } ] }, { "Unnamed: 0": "CVE-2010-4800", "mod_date": "2017-08-17", "pub_date": "2011-04-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in doadd.php in baconmap 1.0 allows remote attackers to execute arbitrary sql commands via the type parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in doadd.php in baconmap 1.0 allows remote attackers to execute arbitrary sql commands via the type parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-04-27\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2016-10921", "mod_date": "2019-08-26", "pub_date": "2019-08-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the gallery-photo-gallery plugin before 1.0.1 for wordpress has sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the gallery-photo-gallery plugin before 1.0.1 for wordpress has sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-22\n- Last Modified Date: 2019-08-26" } ] }, { "Unnamed: 0": "CVE-2008-2679", "mod_date": "2017-09-29", "pub_date": "2008-06-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the keywordslist function in _includes/inc_routines.asp in realm cms 2.3 and earlier allows remote attackers to execute arbitrary sql commands via the kwrd parameter in a kwl action to the default uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the keywordslist function in _includes/inc_routines.asp in realm cms 2.3 and earlier allows remote attackers to execute arbitrary sql commands via the kwrd parameter in a kwl action to the default uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-12\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-0801", "mod_date": "2017-09-29", "pub_date": "2008-02-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the paxxgallery (com_paxxgallery) 0.2 component for mambo and joomla! allow remote attackers to execute arbitrary sql commands via (1) the iid parameter in a view action, and possibly (2) the userid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the paxxgallery (com_paxxgallery) 0.2 component for mambo and joomla! allow remote attackers to execute arbitrary sql commands via (1) the iid parameter in a view action, and possibly (2) the userid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-15\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2013-5589", "mod_date": "2018-10-30", "pub_date": "2013-08-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in cacti/host.php in cacti 0.8.8b and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in cacti/host.php in cacti 0.8.8b and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-08-29\n- Last Modified Date: 2018-10-30" } ] }, { "Unnamed: 0": "CVE-2015-6911", "mod_date": "2018-10-09", "pub_date": "2015-09-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in synology video station before 1.5-0763 allows remote attackers to execute arbitrary sql commands via the id parameter to watchstatus.cgi.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in synology video station before 1.5-0763 allows remote attackers to execute arbitrary sql commands via the id parameter to watchstatus.cgi.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-09-11\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2014-10387", "mod_date": "2019-08-26", "pub_date": "2019-08-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the wp-support-plus-responsive-ticket-system plugin before 4.2 for wordpress has sql injection.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the wp-support-plus-responsive-ticket-system plugin before 4.2 for wordpress has sql injection.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-22\n- Last Modified Date: 2019-08-26" } ] }, { "Unnamed: 0": "CVE-2016-0224", "mod_date": "2016-06-28", "pub_date": "2016-06-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ibm marketing platform 8.5.x, 8.6.x, and 9.x before 9.1.2.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ibm marketing platform 8.5.x, 8.6.x, and 9.x before 9.1.2.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-06-28\n- Last Modified Date: 2016-06-28" } ] }, { "Unnamed: 0": "CVE-2016-3266", "mod_date": "2018-10-12", "pub_date": "2016-10-14", "cvss": 10.0, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3376, cve-2016-7185, and cve-2016-7211.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 10.0\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3376, cve-2016-7185, and cve-2016-7211.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-10-14\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2007-4491", "mod_date": "2018-10-15", "pub_date": "2007-08-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in uyeler2.php in gurur haber 2.0 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in uyeler2.php in gurur haber 2.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-08-23\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2012-4060", "mod_date": "2017-08-29", "pub_date": "2012-07-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in asp-dev xm forums rc3 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) profile.asp, (2) forum.asp, or (3) topic.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in asp-dev xm forums rc3 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) profile.asp, (2) forum.asp, or (3) topic.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-07-25\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2016-6737", "mod_date": "2016-11-28", "pub_date": "2016-11-25", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the kernel ion subsystem in android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. android id: a-30928456.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the kernel ion subsystem in android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. android id: a-30928456.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-25\n- Last Modified Date: 2016-11-28" } ] }, { "Unnamed: 0": "CVE-2010-1431", "mod_date": "2012-02-16", "pub_date": "2010-05-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in templates_export.php in cacti 0.8.7e and earlier allows remote attackers to execute arbitrary sql commands via the export_item_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in templates_export.php in cacti 0.8.7e and earlier allows remote attackers to execute arbitrary sql commands via the export_item_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-04\n- Last Modified Date: 2012-02-16" } ] }, { "Unnamed: 0": "CVE-2016-6717", "mod_date": "2019-03-07", "pub_date": "2016-11-25", "cvss": 7.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in mediaserver in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-11-01, and 7.0 before 2016-11-01 could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as moderate because it first requires exploitation of a separate vulnerability. android id: a-31350239.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in mediaserver in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-11-01, and 7.0 before 2016-11-01 could enable a local malicious application to execute arbitrary code within the context of a privileged process. this issue is rated as moderate because it first requires exploitation of a separate vulnerability. android id: a-31350239.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-11-25\n- Last Modified Date: 2019-03-07" } ] }, { "Unnamed: 0": "CVE-2015-6100", "mod_date": "2019-05-15", "pub_date": "2015-11-11", "cvss": 6.9, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"windows kernel memory elevation of privilege vulnerability,\" a different vulnerability than cve-2015-6101.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"windows kernel memory elevation of privilege vulnerability,\" a different vulnerability than cve-2015-6101.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-11-11\n- Last Modified Date: 2019-05-15" } ] }, { "Unnamed: 0": "CVE-2014-1455", "mod_date": "2018-10-09", "pub_date": "2014-04-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the password reset functionality in pearson esis enterprise student information system, possibly 3.3.0.13 and earlier, allows remote attackers to execute arbitrary sql commands via the new password.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the password reset functionality in pearson esis enterprise student information system, possibly 3.3.0.13 and earlier, allows remote attackers to execute arbitrary sql commands via the new password.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-04-10\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2006-0192", "mod_date": "2018-10-19", "pub_date": "2006-01-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in login_validate.asp in aspsurvey 1.10 allows remote attackers to execute arbitrary sql commands via the password parameter to login.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in login_validate.asp in aspsurvey 1.10 allows remote attackers to execute arbitrary sql commands via the password parameter to login.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-01-13\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2017-1002013", "mod_date": "2017-09-20", "pub_date": "2017-09-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, blind sql injection via imgid parameter in image-gallery-with-slideshow/admin_setting.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, blind sql injection via imgid parameter in image-gallery-with-slideshow/admin_setting.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-09-14\n- Last Modified Date: 2017-09-20" } ] }, { "Unnamed: 0": "CVE-2013-5569", "mod_date": "2017-08-29", "pub_date": "2013-08-23", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the slideshare extension 0.1.0 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the slideshare extension 0.1.0 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-08-23\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2019-0686", "mod_date": "2019-03-06", "pub_date": "2019-03-05", "cvss": 5.8, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists in microsoft exchange server, aka 'microsoft exchange server elevation of privilege vulnerability'. this cve id is unique from cve-2019-0724.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 5.8\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists in microsoft exchange server, aka 'microsoft exchange server elevation of privilege vulnerability'. this cve id is unique from cve-2019-0724.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/NONE\n- Published Date: 2019-03-05\n- Last Modified Date: 2019-03-06" } ] }, { "Unnamed: 0": "CVE-2009-0429", "mod_date": "2018-10-11", "pub_date": "2009-02-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in active bids allow remote attackers to execute arbitrary sql commands via the (1) search parameter to search.asp, (2) sortdir parameter to auctionsended.asp, and the (3) catid parameter to wishlist.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in active bids allow remote attackers to execute arbitrary sql commands via the (1) search parameter to search.asp, (2) sortdir parameter to auctionsended.asp, and the (3) catid parameter to wishlist.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-05\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2014-4077", "mod_date": "2018-10-12", "pub_date": "2014-11-11", "cvss": 9.3, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, and office 2007 sp3, when imjpdct.exe (aka ime for japanese) is installed, allow remote attackers to bypass a sandbox protection mechanism via a crafted pdf document, aka \"microsoft ime (japanese) elevation of privilege vulnerability,\" as exploited in the wild in 2014.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, and office 2007 sp3, when imjpdct.exe (aka ime for japanese) is installed, allow remote attackers to bypass a sandbox protection mechanism via a crafted pdf document, aka \"microsoft ime (japanese) elevation of privilege vulnerability,\" as exploited in the wild in 2014.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2014-11-11\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2008-6477", "mod_date": "2017-09-29", "pub_date": "2009-03-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in mumbo jumbo media op4 allows remote attackers to execute arbitrary sql commands via the id parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in mumbo jumbo media op4 allows remote attackers to execute arbitrary sql commands via the id parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-16\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-6288", "mod_date": "2017-08-08", "pub_date": "2007-12-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in tcexam before 5.1.000 allow remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in tcexam before 5.1.000 allow remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-12-10\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2017-7879", "mod_date": "2017-04-21", "pub_date": "2017-04-14", "cvss": 5.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in flatcore version 1.4.6 allows an attacker to read the content database.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in flatcore version 1.4.6 allows an attacker to read the content database.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-04-14\n- Last Modified Date: 2017-04-21" } ] }, { "Unnamed: 0": "CVE-2008-4786", "mod_date": "2017-09-29", "pub_date": "2008-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in easyshop.php in the easyshop plugin for e107 allows remote attackers to execute arbitrary sql commands via the category_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in easyshop.php in the easyshop plugin for e107 allows remote attackers to execute arbitrary sql commands via the category_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-29\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2007-5141", "mod_date": "2018-10-15", "pub_date": "2007-09-28", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in search.php in sitex cms 0.7.3 beta allows remote attackers to execute arbitrary sql commands via the search parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in search.php in sitex cms 0.7.3 beta allows remote attackers to execute arbitrary sql commands via the search parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-09-28\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2014-5184", "mod_date": "2014-08-07", "pub_date": "2014-08-06", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the stripshow-storylines page in the stripshow plugin 2.5.2 for wordpress allows remote authenticated administrators to execute arbitrary sql commands via the story parameter in an edit action to wp-admin/admin.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the stripshow-storylines page in the stripshow plugin 2.5.2 for wordpress allows remote authenticated administrators to execute arbitrary sql commands via the story parameter in an edit action to wp-admin/admin.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-08-06\n- Last Modified Date: 2014-08-07" } ] }, { "Unnamed: 0": "CVE-2006-4042", "mod_date": "2018-10-17", "pub_date": "2006-08-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in trackback.php in mywebland mybloggie 2.1.4 and earlier allow remote attackers to execute arbitrary sql commands via the (1) title, (2) url, (3) excerpt, or (4) blog_name parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in trackback.php in mywebland mybloggie 2.1.4 and earlier allow remote attackers to execute arbitrary sql commands via the (1) title, (2) url, (3) excerpt, or (4) blog_name parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-08-09\n- Last Modified Date: 2018-10-17" } ] }, { "Unnamed: 0": "CVE-2016-0073", "mod_date": "2018-10-12", "pub_date": "2016-10-14", "cvss": 2.1, "cwe_code": 200, "cwe_name": " Information Exposure", "summary": "the kernel in microsoft windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allows local users to gain privileges via a crafted application that makes an api call to access sensitive information in the registry, aka \"windows kernel local elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0075.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Information Exposure." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 200:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 2.1\n- CWE Name: Information Exposure\n- Summary: the kernel in microsoft windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allows local users to gain privileges via a crafted application that makes an api call to access sensitive information in the registry, aka \"windows kernel local elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0075.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2016-10-14\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2008-4778", "mod_date": "2018-10-11", "pub_date": "2008-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the gallery module in koobi cms 4.3.0 allows remote attackers to execute arbitrary sql commands via the galid parameter in a showimages action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the gallery module in koobi cms 4.3.0 allows remote attackers to execute arbitrary sql commands via the galid parameter in a showimages action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-29\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2008-2444", "mod_date": "2017-09-29", "pub_date": "2008-05-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in userreg.php in calogic calendars 1.2.2 allows remote attackers to execute arbitrary sql commands via the langsel parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in userreg.php in calogic calendars 1.2.2 allows remote attackers to execute arbitrary sql commands via the langsel parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-27\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-2095", "mod_date": "2017-09-29", "pub_date": "2008-05-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the flippingbook (com_flippingbook) 1.0.4 component for joomla! allows remote attackers to execute arbitrary sql commands via the book_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the flippingbook (com_flippingbook) 1.0.4 component for joomla! allows remote attackers to execute arbitrary sql commands via the book_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-06\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2015-4612", "mod_date": "2016-12-07", "pub_date": "2015-06-16", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the \"faq - frequently asked questions\" (js_faq) extension before 1.2.1 for typo3 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the \"faq - frequently asked questions\" (js_faq) extension before 1.2.1 for typo3 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-06-16\n- Last Modified Date: 2016-12-07" } ] }, { "Unnamed: 0": "CVE-2007-0527", "mod_date": "2018-10-16", "pub_date": "2007-01-26", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the is_remembered function in class.login.php in website baker 2.6.5 and earlier allows remote attackers to execute arbitrary sql commands via the remember_key cookie parameter. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the is_remembered function in class.login.php in website baker 2.6.5 and earlier allows remote attackers to execute arbitrary sql commands via the remember_key cookie parameter. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-01-26\n- Last Modified Date: 2018-10-16" } ] }, { "Unnamed: 0": "CVE-2008-4169", "mod_date": "2017-09-29", "pub_date": "2008-09-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in detaillist.php in iscripts easyindex, possibly 1.0, allows remote attackers to execute arbitrary sql commands via the produid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in detaillist.php in iscripts easyindex, possibly 1.0, allows remote attackers to execute arbitrary sql commands via the produid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-22\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-8497", "mod_date": "2019-10-03", "pub_date": "2018-10-10", "cvss": 4.6, "cwe_code": 404, "cwe_name": " Improper Resource Shutdown or Release", "summary": "an elevation of privilege vulnerability exists in the way that the windows kernel handles objects in memory, aka \"windows kernel elevation of privilege vulnerability.\" this affects windows server 2016, windows 10, windows server 2019, windows 10 servers.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Resource Shutdown or Release." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 404:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Improper Resource Shutdown or Release\n- Summary: an elevation of privilege vulnerability exists in the way that the windows kernel handles objects in memory, aka \"windows kernel elevation of privilege vulnerability.\" this affects windows server 2016, windows 10, windows server 2019, windows 10 servers.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-10-10\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2012-2684", "mod_date": "2013-11-25", "pub_date": "2012-09-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the get_sample_filters_by_signature function in cumin before 0.1.5444, as used in red hat enterprise messaging, realtime, and grid (mrg) 2.0, allow remote attackers to execute arbitrary sql commands via the (1) agent or (2) object id.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the get_sample_filters_by_signature function in cumin before 0.1.5444, as used in red hat enterprise messaging, realtime, and grid (mrg) 2.0, allow remote attackers to execute arbitrary sql commands via the (1) agent or (2) object id.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-09-28\n- Last Modified Date: 2013-11-25" } ] }, { "Unnamed: 0": "CVE-2017-3801", "mod_date": "2019-10-03", "pub_date": "2017-02-15", "cvss": 4.6, "cwe_code": 863, "cwe_name": " Incorrect Authorization", "summary": "a vulnerability in the web-based gui of cisco ucs director 6.0.0.0 and 6.0.0.1 could allow an authenticated, local attacker to execute arbitrary workflow items with just an end-user profile, a privilege escalation vulnerability. the vulnerability is due to improper role-based access control (rbac) after the developer menu is enabled in cisco ucs director. an attacker could exploit this vulnerability by enabling developer mode for his/her user profile with an end-user profile and then adding new catalogs with arbitrary workflow items to his/her profile. an exploit could allow an attacker to perform any actions defined by these workflow items, including actions affecting other tenants. cisco bug ids: cscvb64765.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Authorization." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 863:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Incorrect Authorization\n- Summary: a vulnerability in the web-based gui of cisco ucs director 6.0.0.0 and 6.0.0.1 could allow an authenticated, local attacker to execute arbitrary workflow items with just an end-user profile, a privilege escalation vulnerability. the vulnerability is due to improper role-based access control (rbac) after the developer menu is enabled in cisco ucs director. an attacker could exploit this vulnerability by enabling developer mode for his/her user profile with an end-user profile and then adding new catalogs with arbitrary workflow items to his/her profile. an exploit could allow an attacker to perform any actions defined by these workflow items, including actions affecting other tenants. cisco bug ids: cscvb64765.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-02-15\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2012-2908", "mod_date": "2017-08-29", "pub_date": "2012-05-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in admin/bbcodes.php in viscacha 0.8.1.1 allow remote attackers to execute arbitrary sql commands via the (1) bbcodeexample, (2) buttonimage, or (3) bbcodetag parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in admin/bbcodes.php in viscacha 0.8.1.1 allow remote attackers to execute arbitrary sql commands via the (1) bbcodeexample, (2) buttonimage, or (3) bbcodetag parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-05-21\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2017-17941", "mod_date": "2018-01-09", "pub_date": "2017-12-28", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "php scripts mall single theater booking has sql injection via the admin/movieview.php movieid parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: php scripts mall single theater booking has sql injection via the admin/movieview.php movieid parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-28\n- Last Modified Date: 2018-01-09" } ] }, { "Unnamed: 0": "CVE-2008-5636", "mod_date": "2017-09-29", "pub_date": "2008-12-17", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in cate.php in lito lite cms, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the cid parameter.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in cate.php in lito lite cms, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the cid parameter.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-12-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-14754", "mod_date": "2019-08-14", "pub_date": "2019-08-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "open-school 3.0, and community edition 2.3, allows sql injection via the index.php?r=students/students/document id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: open-school 3.0, and community edition 2.3, allows sql injection via the index.php?r=students/students/document id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-08\n- Last Modified Date: 2019-08-14" } ] }, { "Unnamed: 0": "CVE-2008-2837", "mod_date": "2017-09-29", "pub_date": "2008-06-24", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in cms-brd allows remote attackers to execute arbitrary sql commands via the menuclick parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in cms-brd allows remote attackers to execute arbitrary sql commands via the menuclick parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-06-24\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-6327", "mod_date": "2017-09-29", "pub_date": "2009-02-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in proquiz 1.0 allows remote attackers to execute arbitrary sql commands via the password parameter, a different vector than cve-2008-6312.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in proquiz 1.0 allows remote attackers to execute arbitrary sql commands via the password parameter, a different vector than cve-2008-6312.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-27\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-13957", "mod_date": "2019-10-04", "pub_date": "2019-10-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "in umbraco 7.3.8, there is sql injection in the backoffice/pagewapprove/pagewapproveapi/getinpectsearch method via the nodename parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: in umbraco 7.3.8, there is sql injection in the backoffice/pagewapprove/pagewapproveapi/getinpectsearch method via the nodename parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-02\n- Last Modified Date: 2019-10-04" } ] }, { "Unnamed: 0": "CVE-2017-12909", "mod_date": "2017-08-20", "pub_date": "2017-08-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in modtask.php in nexusphp 1.5 allows remote attackers to execute arbitrary sql commands via the userid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in modtask.php in nexusphp 1.5 allows remote attackers to execute arbitrary sql commands via the userid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-08-17\n- Last Modified Date: 2017-08-20" } ] }, { "Unnamed: 0": "CVE-2013-5121", "mod_date": "2013-08-14", "pub_date": "2013-08-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in phpfox before 3.6.0 (build6) allows remote attackers to execute arbitrary sql commands via the search[sort_by] parameter to user/browse/view_/.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in phpfox before 3.6.0 (build6) allows remote attackers to execute arbitrary sql commands via the search[sort_by] parameter to user/browse/view_/.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-08-14\n- Last Modified Date: 2013-08-14" } ] }, { "Unnamed: 0": "CVE-2018-10050", "mod_date": "2018-05-09", "pub_date": "2018-04-11", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "iscripts eswap v2.4 has sql injection via the \"registration_settings.php\" ddlfree parameter in the admin panel.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: iscripts eswap v2.4 has sql injection via the \"registration_settings.php\" ddlfree parameter in the admin panel.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-04-11\n- Last Modified Date: 2018-05-09" } ] }, { "Unnamed: 0": "CVE-2014-5387", "mod_date": "2015-09-08", "pub_date": "2014-11-04", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in ellislab expressionengine before 2.9.1 allow remote authenticated users to execute arbitrary sql commands via the (1) column_filter or (2) category[] parameter to system/index.php or the (3) tbl_sort[0][] parameter in the comment module to system/index.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in ellislab expressionengine before 2.9.1 allow remote authenticated users to execute arbitrary sql commands via the (1) column_filter or (2) category[] parameter to system/index.php or the (3) tbl_sort[0][] parameter in the comment module to system/index.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-11-04\n- Last Modified Date: 2015-09-08" } ] }, { "Unnamed: 0": "CVE-2009-0446", "mod_date": "2017-09-29", "pub_date": "2009-02-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in photo.php in webalbum 2.4b allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in photo.php in webalbum 2.4b allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-10\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-5893", "mod_date": "2019-01-17", "pub_date": "2019-01-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "nelson open source erp v6.3.1 allows sql injection via the db/utils/query/data.xml query parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: nelson open source erp v6.3.1 allows sql injection via the db/utils/query/data.xml query parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-01-10\n- Last Modified Date: 2019-01-17" } ] }, { "Unnamed: 0": "CVE-2017-12262", "mod_date": "2019-10-09", "pub_date": "2017-11-02", "cvss": 5.8, "cwe_code": 665, "cwe_name": " Improper Initialization", "summary": "a vulnerability within the firewall configuration of the cisco application policy infrastructure controller enterprise module (apic-em) could allow an unauthenticated, adjacent attacker to gain privileged access to services only available on the internal network of the device. the vulnerability is due to an incorrect firewall rule on the device. the misconfiguration could allow traffic sent to the public interface of the device to be forwarded to the internal virtual network of the apic-em. an attacker that is logically adjacent to the network on which the public interface of the affected apic-em resides could leverage this behavior to gain access to services listening on the internal network with elevated privileges. this vulnerability affects appliances or virtual devices running cisco application policy infrastructure controller enterprise module prior to version 1.5. cisco bug ids: cscve89638.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "ADJACENT_NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Initialization." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 665:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 5.8\n- CWE Name: Improper Initialization\n- Summary: a vulnerability within the firewall configuration of the cisco application policy infrastructure controller enterprise module (apic-em) could allow an unauthenticated, adjacent attacker to gain privileged access to services only available on the internal network of the device. the vulnerability is due to an incorrect firewall rule on the device. the misconfiguration could allow traffic sent to the public interface of the device to be forwarded to the internal virtual network of the apic-em. an attacker that is logically adjacent to the network on which the public interface of the affected apic-em resides could leverage this behavior to gain access to services listening on the internal network with elevated privileges. this vulnerability affects appliances or virtual devices running cisco application policy infrastructure controller enterprise module prior to version 1.5. cisco bug ids: cscve89638.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: ADJACENT_NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-11-02\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2010-2905", "mod_date": "2017-08-17", "pub_date": "2010-07-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in info.php in scriptsfeed and brotherscripts (bs) scripts directory allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in info.php in scriptsfeed and brotherscripts (bs) scripts directory allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-28\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2015-6101", "mod_date": "2019-05-15", "pub_date": "2015-11-11", "cvss": 6.9, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "the kernel in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"windows kernel memory elevation of privilege vulnerability,\" a different vulnerability than cve-2015-6100.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.9\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: the kernel in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"windows kernel memory elevation of privilege vulnerability,\" a different vulnerability than cve-2015-6100.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-11-11\n- Last Modified Date: 2019-05-15" } ] }, { "Unnamed: 0": "CVE-2010-5006", "mod_date": "2012-02-14", "pub_date": "2011-11-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in googlemap/index.php in emo realty manager allows remote attackers to execute arbitrary sql commands via the cat1 parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in googlemap/index.php in emo realty manager allows remote attackers to execute arbitrary sql commands via the cat1 parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-11-02\n- Last Modified Date: 2012-02-14" } ] }, { "Unnamed: 0": "CVE-2017-9370", "mod_date": "2017-08-24", "pub_date": "2017-08-09", "cvss": 6.5, "cwe_code": 287, "cwe_name": " Improper Authentication", "summary": "an information disclosure / elevation of privilege vulnerability in the blackberry workspaces server could potentially allow an attacker who has legitimate access to blackberry workspaces to gain access to another user's workspace by making multiple login requests to the server.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Authentication." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 287:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Authentication\n- Summary: an information disclosure / elevation of privilege vulnerability in the blackberry workspaces server could potentially allow an attacker who has legitimate access to blackberry workspaces to gain access to another user's workspace by making multiple login requests to the server.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-08-09\n- Last Modified Date: 2017-08-24" } ] }, { "Unnamed: 0": "CVE-2019-5015", "mod_date": "2019-03-21", "pub_date": "2019-03-08", "cvss": 7.2, "cwe_code": 19, "cwe_name": " Data Processing Errors", "summary": "a local privilege escalation vulnerability exists in the mac os x version of pixar renderman 22.3.0's install helper helper tool. a user with local access can use this vulnerability to escalate their privileges to root. an attacker would need local access to the machine for a successful exploit.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Data Processing Errors." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 19:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Data Processing Errors\n- Summary: a local privilege escalation vulnerability exists in the mac os x version of pixar renderman 22.3.0's install helper helper tool. a user with local access can use this vulnerability to escalate their privileges to root. an attacker would need local access to the machine for a successful exploit.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-03-08\n- Last Modified Date: 2019-03-21" } ] }, { "Unnamed: 0": "CVE-2010-4797", "mod_date": "2017-08-17", "pub_date": "2011-04-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the log-in form in truworth flex timesheet allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the log-in form in truworth flex timesheet allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-04-27\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2017-6781", "mod_date": "2019-10-03", "pub_date": "2017-08-17", "cvss": 4.6, "cwe_code": 287, "cwe_name": " Improper Authentication", "summary": "a vulnerability in the management of shell user accounts for cisco policy suite (cps) software for cps appliances could allow an authenticated, local attacker to gain elevated privileges on an affected system. the affected privilege level is not at the root level. the vulnerability is due to incorrect role-based access control (rbac) for shell user accounts. an attacker could exploit this vulnerability by authenticating to an affected appliance and providing crafted user input via the cli. a successful exploit could allow the attacker to acquire a higher privilege level than should have been granted. to exploit this vulnerability, the attacker must log in to the appliance with valid credentials. cisco bug ids: cscve37724. known affected releases: 9.0.0, 9.1.0, 10.0.0, 11.0.0, 12.0.0.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Authentication." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 287:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Improper Authentication\n- Summary: a vulnerability in the management of shell user accounts for cisco policy suite (cps) software for cps appliances could allow an authenticated, local attacker to gain elevated privileges on an affected system. the affected privilege level is not at the root level. the vulnerability is due to incorrect role-based access control (rbac) for shell user accounts. an attacker could exploit this vulnerability by authenticating to an affected appliance and providing crafted user input via the cli. a successful exploit could allow the attacker to acquire a higher privilege level than should have been granted. to exploit this vulnerability, the attacker must log in to the appliance with valid credentials. cisco bug ids: cscve37724. known affected releases: 9.0.0, 9.1.0, 10.0.0, 11.0.0, 12.0.0.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-08-17\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2017-0110", "mod_date": "2018-08-09", "pub_date": "2017-03-17", "cvss": 4.3, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "cross-site scripting (xss) vulnerability in microsoft exchange outlook web access (owa) allows remote attackers to inject arbitrary web script or html via a crafted email or chat client, aka \"microsoft exchange server elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.3\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: cross-site scripting (xss) vulnerability in microsoft exchange outlook web access (owa) allows remote attackers to inject arbitrary web script or html via a crafted email or chat client, aka \"microsoft exchange server elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2017-03-17\n- Last Modified Date: 2018-08-09" } ] }, { "Unnamed: 0": "CVE-2018-6584", "mod_date": "2018-03-05", "pub_date": "2018-02-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the dt register 3.2.7 component for joomla! via a task=edit&id= request.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the dt register 3.2.7 component for joomla! via a task=edit&id= request.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-17\n- Last Modified Date: 2018-03-05" } ] }, { "Unnamed: 0": "CVE-2011-2149", "mod_date": "2017-08-29", "pub_date": "2011-05-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the smartertools smarterstats 6.0 web server allow remote attackers to execute arbitrary sql commands via certain parameters to (1) admin/frmsite.aspx, (2) default.aspx, (3) services/siteadmin.asmx, or (4) client/frmviewreports.aspx; certain cookies to (5) services/siteadmin.asmx or (6) login.aspx; the referer http header to (7) services/siteadmin.asmx or (8) login.aspx; or (9) the user-agent http header to services/siteadmin.asmx.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the smartertools smarterstats 6.0 web server allow remote attackers to execute arbitrary sql commands via certain parameters to (1) admin/frmsite.aspx, (2) default.aspx, (3) services/siteadmin.asmx, or (4) client/frmviewreports.aspx; certain cookies to (5) services/siteadmin.asmx or (6) login.aspx; the referer http header to (7) services/siteadmin.asmx or (8) login.aspx; or (9) the user-agent http header to services/siteadmin.asmx.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2011-05-20\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2010-2510", "mod_date": "2010-06-29", "pub_date": "2010-06-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in customize.php in 2daybiz web template software allows remote attackers to execute arbitrary sql commands via the tid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in customize.php in 2daybiz web template software allows remote attackers to execute arbitrary sql commands via the tid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-06-28\n- Last Modified Date: 2010-06-29" } ] }, { "Unnamed: 0": "CVE-2008-4423", "mod_date": "2018-10-11", "pub_date": "2008-10-03", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in ovidentia 6.6.5 allows remote attackers to execute arbitrary sql commands via the item parameter in a contact modify action.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in ovidentia 6.6.5 allows remote attackers to execute arbitrary sql commands via the item parameter in a contact modify action.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-03\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2007-4762", "mod_date": "2018-10-15", "pub_date": "2007-09-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in embadmin/login.asp in e-smartcart 1.0 allow remote attackers to execute arbitrary sql commands via the (1) user and (2) pass fields, different vectors than cve-2007-0092.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in embadmin/login.asp in e-smartcart 1.0 allow remote attackers to execute arbitrary sql commands via the (1) user and (2) pass fields, different vectors than cve-2007-0092.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-09-08\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2016-7091", "mod_date": "2016-12-23", "pub_date": "2016-12-22", "cvss": 4.9, "cwe_code": 200, "cwe_name": " Information Exposure", "summary": "sudo: it was discovered that the default sudo configuration on red hat enterprise linux and possibly other linux implementations preserves the value of inputrc which could lead to information disclosure. a local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "NONE", "impact_confidentiality": "COMPLETE", "impact_integrity": "NONE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Information Exposure." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 200:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.9\n- CWE Name: Information Exposure\n- Summary: sudo: it was discovered that the default sudo configuration on red hat enterprise linux and possibly other linux implementations preserves the value of inputrc which could lead to information disclosure. a local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/NONE/NONE\n- Published Date: 2016-12-22\n- Last Modified Date: 2016-12-23" } ] }, { "Unnamed: 0": "CVE-2012-1672", "mod_date": "2017-08-29", "pub_date": "2012-04-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in getcity.php in hotel booking portal 0.1 allows remote attackers to execute arbitrary sql commands via the country parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in getcity.php in hotel booking portal 0.1 allows remote attackers to execute arbitrary sql commands via the country parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-04-11\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2013-7094", "mod_date": "2018-12-10", "pub_date": "2013-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the rsddcver_count_tab_cols function in sap netweaver 7.30 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the rsddcver_count_tab_cols function in sap netweaver 7.30 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-12-13\n- Last Modified Date: 2018-12-10" } ] }, { "Unnamed: 0": "CVE-2019-12463", "mod_date": "2019-09-10", "pub_date": "2019-09-09", "cvss": 6.5, "cwe_code": 94, "cwe_name": " Improper Control of Generation of Code ('Code Injection')", "summary": "an issue was discovered in librenms 1.50.1. the scripts that handle graphing options (includes/html/graphs/common.inc.php and includes/html/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing sql injection attacks; other parameters are unfiltered. this allows an attacker to inject rrdtool syntax with newline characters via the html/graph.php and html/graph-realtime.php scripts. rrdtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, disclosing file content, denial of service, or writing arbitrary files. note: relative to cve-2019-10665, this requires authentication and the pathnames differ.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Control of Generation of Code ('Code Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 94:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Control of Generation of Code ('Code Injection')\n- Summary: an issue was discovered in librenms 1.50.1. the scripts that handle graphing options (includes/html/graphs/common.inc.php and includes/html/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing sql injection attacks; other parameters are unfiltered. this allows an attacker to inject rrdtool syntax with newline characters via the html/graph.php and html/graph-realtime.php scripts. rrdtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, disclosing file content, denial of service, or writing arbitrary files. note: relative to cve-2019-10665, this requires authentication and the pathnames differ.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-09\n- Last Modified Date: 2019-09-10" } ] }, { "Unnamed: 0": "CVE-2018-8641", "mod_date": "2019-10-03", "pub_date": "2018-12-12", "cvss": 7.2, "cwe_code": 404, "cwe_name": " Improper Resource Shutdown or Release", "summary": "an elevation of privilege vulnerability exists in windows when the windows kernel-mode driver fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability.\" this affects windows 7, windows server 2012 r2, windows rt 8.1, windows server 2008, windows server 2019, windows server 2012, windows 8.1, windows server 2016, windows server 2008 r2, windows 10, windows 10 servers. this cve id is unique from cve-2018-8639.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Resource Shutdown or Release." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 404:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Resource Shutdown or Release\n- Summary: an elevation of privilege vulnerability exists in windows when the windows kernel-mode driver fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability.\" this affects windows 7, windows server 2012 r2, windows rt 8.1, windows server 2008, windows server 2019, windows server 2012, windows 8.1, windows server 2016, windows server 2008 r2, windows 10, windows 10 servers. this cve id is unique from cve-2018-8639.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-12-12\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2017-6264", "mod_date": "2019-10-03", "pub_date": "2017-11-14", "cvss": 9.3, "cwe_code": 125, "cwe_name": " Out-of-bounds Read", "summary": "an elevation of privilege vulnerability exists in the nvidia gpu driver (gm20b_clk_throt_set_cdev_state), where an out of bound memory read is used as a function pointer could lead to code execution in the kernel.this issue is rated as high because it could allow a local malicious application to execute arbitrary code within the context of a privileged process. product: android. version: n/a. android id: a-34705430. references: n-cve-2017-6264.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Out-of-bounds Read." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 125:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.3\n- CWE Name: Out-of-bounds Read\n- Summary: an elevation of privilege vulnerability exists in the nvidia gpu driver (gm20b_clk_throt_set_cdev_state), where an out of bound memory read is used as a function pointer could lead to code execution in the kernel.this issue is rated as high because it could allow a local malicious application to execute arbitrary code within the context of a privileged process. product: android. version: n/a. android id: a-34705430. references: n-cve-2017-6264.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-11-14\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2019-17293", "mod_date": "2019-10-10", "pub_date": "2019-10-07", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sugarcrm before 8.0.4 and 9.x before 9.0.2 allows sql injection in the pmse_project module by a regular user.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sugarcrm before 8.0.4 and 9.x before 9.0.2 allows sql injection in the pmse_project module by a regular user.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-07\n- Last Modified Date: 2019-10-10" } ] }, { "Unnamed: 0": "CVE-2009-3595", "mod_date": "2017-09-19", "pub_date": "2009-10-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in results.php in vs panel 7.5.5 allows remote attackers to execute arbitrary sql commands via the cat_id parameter, a different vector than cve-2009-3590.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in results.php in vs panel 7.5.5 allows remote attackers to execute arbitrary sql commands via the cat_id parameter, a different vector than cve-2009-3590.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-10-08\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2008-6344", "mod_date": "2009-03-02", "pub_date": "2009-02-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the tu-clausthal staff (tuc_staff) 0.3.0 and earlier extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the tu-clausthal staff (tuc_staff) 0.3.0 and earlier extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-02-27\n- Last Modified Date: 2009-03-02" } ] }, { "Unnamed: 0": "CVE-2008-2208", "mod_date": "2018-10-11", "pub_date": "2008-05-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in maian greeting 2.1 allows remote attackers to execute arbitrary sql commands via the keywords parameter in a search action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in maian greeting 2.1 allows remote attackers to execute arbitrary sql commands via the keywords parameter in a search action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-14\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2017-8192", "mod_date": "2019-10-03", "pub_date": "2017-11-22", "cvss": 4.6, "cwe_code": 863, "cwe_name": " Incorrect Authorization", "summary": "fusionsphere openstack v100r006c00 has an improper authorization vulnerability. due to improper authorization, an attacker with low privilege may exploit this vulnerability to obtain the operation authority of some specific directory, causing privilege escalation.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Authorization." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 863:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Incorrect Authorization\n- Summary: fusionsphere openstack v100r006c00 has an improper authorization vulnerability. due to improper authorization, an attacker with low privilege may exploit this vulnerability to obtain the operation authority of some specific directory, causing privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-11-22\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-7177", "mod_date": "2018-03-02", "pub_date": "2018-02-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the saxum numerology 3.0.4 component for joomla! via the publicid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the saxum numerology 3.0.4 component for joomla! via the publicid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-02-17\n- Last Modified Date: 2018-03-02" } ] }, { "Unnamed: 0": "CVE-2008-0857", "mod_date": "2018-10-15", "pub_date": "2008-02-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in woltlab burning board 3.0.3 pl 1 allows remote attackers to execute arbitrary sql commands via the sortorder parameter to the pmlist page.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in woltlab burning board 3.0.3 pl 1 allows remote attackers to execute arbitrary sql commands via the sortorder parameter to the pmlist page.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-02-21\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2019-17180", "mod_date": "2019-10-15", "pub_date": "2019-10-04", "cvss": 7.2, "cwe_code": 22, "cwe_name": " Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "summary": "valve steam client before 2019-09-12 allows placing or appending partially controlled filesystem content, as demonstrated by file modifications on windows in the context of nt authority\\system. this could lead to denial of service, elevation of privilege, or unspecified other impact.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 22:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\n- Summary: valve steam client before 2019-09-12 allows placing or appending partially controlled filesystem content, as demonstrated by file modifications on windows in the context of nt authority\\system. this could lead to denial of service, elevation of privilege, or unspecified other impact.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-10-04\n- Last Modified Date: 2019-10-15" } ] }, { "Unnamed: 0": "CVE-2012-3350", "mod_date": "2018-05-29", "pub_date": "2012-07-12", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in webmatic 3.1.1 allows remote attackers to execute arbitrary sql commands via the referer http header.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in webmatic 3.1.1 allows remote attackers to execute arbitrary sql commands via the referer http header.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-07-12\n- Last Modified Date: 2018-05-29" } ] }, { "Unnamed: 0": "CVE-2019-5012", "mod_date": "2019-10-29", "pub_date": "2019-10-24", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "an exploitable privilege escalation vulnerability exists in the wacom, driver version 6.3.32-3, update helper service in the startprocess command. the command takes a user-supplied script argument and executes it under root context. a user with local access can use this vulnerability to raise their privileges to root. an attacker would need local access to the machine for a successful exploit.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: an exploitable privilege escalation vulnerability exists in the wacom, driver version 6.3.32-3, update helper service in the startprocess command. the command takes a user-supplied script argument and executes it under root context. a user with local access can use this vulnerability to raise their privileges to root. an attacker would need local access to the machine for a successful exploit.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-10-24\n- Last Modified Date: 2019-10-29" } ] }, { "Unnamed: 0": "CVE-2017-16510", "mod_date": "2018-02-04", "pub_date": "2017-11-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "wordpress before 4.8.3 is affected by an issue where $wpdb->prepare() can create unexpected and unsafe queries leading to potential sql injection (sqli) in plugins and themes, as demonstrated by a \"double prepare\" approach, a different vulnerability than cve-2017-14723.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: wordpress before 4.8.3 is affected by an issue where $wpdb->prepare() can create unexpected and unsafe queries leading to potential sql injection (sqli) in plugins and themes, as demonstrated by a \"double prepare\" approach, a different vulnerability than cve-2017-14723.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-11-02\n- Last Modified Date: 2018-02-04" } ] }, { "Unnamed: 0": "CVE-2014-6239", "mod_date": "2014-09-11", "pub_date": "2014-09-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the address visualization with google maps (st_address_map) extension before 0.3.6 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the address visualization with google maps (st_address_map) extension before 0.3.6 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-09-11\n- Last Modified Date: 2014-09-11" } ] }, { "Unnamed: 0": "CVE-2015-7517", "mod_date": "2017-09-07", "pub_date": "2017-08-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the double opt-in for download plugin before 2.0.9 for wordpress allow remote attackers to execute arbitrary sql commands via the ver parameter to (1) class-doifd-download.php or (2) class-doifd-landing-page.php in public/includes/.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the double opt-in for download plugin before 2.0.9 for wordpress allow remote attackers to execute arbitrary sql commands via the ver parameter to (1) class-doifd-download.php or (2) class-doifd-landing-page.php in public/includes/.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-08-29\n- Last Modified Date: 2017-09-07" } ] }, { "Unnamed: 0": "CVE-2019-15570", "mod_date": "2019-08-29", "pub_date": "2019-08-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "bedita through 4.0.0-rc2 allows sql injection during a save operation for a relation with parameters.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: bedita through 4.0.0-rc2 allows sql injection during a save operation for a relation with parameters.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-26\n- Last Modified Date: 2019-08-29" } ] }, { "Unnamed: 0": "CVE-2019-9486", "mod_date": "2019-05-03", "pub_date": "2019-04-30", "cvss": 9.0, "cwe_code": 284, "cwe_name": " Improper Access Control", "summary": "strato hidrive desktop client 5.0.1.0 for windows suffers from a system privilege escalation vulnerability through the hidrivemaintenanceservice service. this service establishes a netnamedpipe endpoint that allows applications to connect and call publicly exposed methods. an attacker can inject and execute code by hijacking the insecure communications with the service. this vulnerability also affects telekom magentacloud through 5.7.0.0 and 1&1 online storage through 6.1.0.0.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Access Control." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 284:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 9.0\n- CWE Name: Improper Access Control\n- Summary: strato hidrive desktop client 5.0.1.0 for windows suffers from a system privilege escalation vulnerability through the hidrivemaintenanceservice service. this service establishes a netnamedpipe endpoint that allows applications to connect and call publicly exposed methods. an attacker can inject and execute code by hijacking the insecure communications with the service. this vulnerability also affects telekom magentacloud through 5.7.0.0 and 1&1 online storage through 6.1.0.0.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-04-30\n- Last Modified Date: 2019-05-03" } ] }, { "Unnamed: 0": "CVE-2013-5640", "mod_date": "2016-12-31", "pub_date": "2014-04-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in gnew 2013.1 allow remote attackers to execute arbitrary sql commands via the (1) answer_id or (2) question_id parameter to polls/vote.php, (3) story_id parameter to comments/add.php or (4) comments/edit.php, or (5) thread_id parameter to posts/add.php. note: this issue was split due to differences in researchers and disclosure dates. cve-2013-7349 already covers the news_id parameter to news/send.php, user_email parameter to users/register.php, and thread_id to posts/edit.php vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in gnew 2013.1 allow remote attackers to execute arbitrary sql commands via the (1) answer_id or (2) question_id parameter to polls/vote.php, (3) story_id parameter to comments/add.php or (4) comments/edit.php, or (5) thread_id parameter to posts/add.php. note: this issue was split due to differences in researchers and disclosure dates. cve-2013-7349 already covers the news_id parameter to news/send.php, user_email parameter to users/register.php, and thread_id to posts/edit.php vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-04-01\n- Last Modified Date: 2016-12-31" } ] }, { "Unnamed: 0": "CVE-2019-17319", "mod_date": "2019-10-09", "pub_date": "2019-10-07", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sugarcrm before 8.0.4 and 9.x before 9.0.2 allows sql injection in the emails module by a regular user.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sugarcrm before 8.0.4 and 9.x before 9.0.2 allows sql injection in the emails module by a regular user.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-07\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2019-10708", "mod_date": "2019-04-03", "pub_date": "2019-04-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "s-cms php v1.0 has sql injection via the 4/js/scms.php?action=unlike id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: s-cms php v1.0 has sql injection via the 4/js/scms.php?action=unlike id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-04-02\n- Last Modified Date: 2019-04-03" } ] }, { "Unnamed: 0": "CVE-2008-5097", "mod_date": "2018-10-11", "pub_date": "2008-11-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in myfwb 1.0 allows remote attackers to execute arbitrary sql commands via the page parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in myfwb 1.0 allows remote attackers to execute arbitrary sql commands via the page parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-14\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2008-4701", "mod_date": "2017-08-08", "pub_date": "2008-10-22", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin.php in libera cms 1.12, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the libera_staff_user cookie parameter, a different vector than cve-2008-4700. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin.php in libera cms 1.12, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the libera_staff_user cookie parameter, a different vector than cve-2008-4700. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-22\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2009-4935", "mod_date": "2017-09-19", "pub_date": "2010-07-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ogp_show.php in online guestbook pro allows remote attackers to execute arbitrary sql commands via the display parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ogp_show.php in online guestbook pro allows remote attackers to execute arbitrary sql commands via the display parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-07-12\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2012-0935", "mod_date": "2017-08-29", "pub_date": "2012-01-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in default.aspx in aryadad cms allows remote attackers to execute arbitrary sql commands via the pageid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in default.aspx in aryadad cms allows remote attackers to execute arbitrary sql commands via the pageid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-01-29\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2019-3760", "mod_date": "2019-10-09", "pub_date": "2019-09-11", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the rsa identity governance and lifecycle software and rsa via lifecycle and governance products prior to 7.1.0 p08 contain a sql injection vulnerability in workflow architect. a remote authenticated malicious user could potentially exploit this vulnerability to execute sql commands on the back-end database to gain unauthorized access to the data by supplying specially crafted input data to the affected application.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the rsa identity governance and lifecycle software and rsa via lifecycle and governance products prior to 7.1.0 p08 contain a sql injection vulnerability in workflow architect. a remote authenticated malicious user could potentially exploit this vulnerability to execute sql commands on the back-end database to gain unauthorized access to the data by supplying specially crafted input data to the affected application.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-11\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2009-2400", "mod_date": "2017-09-19", "pub_date": "2009-07-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the php (com_php) component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the php (com_php) component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-09\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2007-6012", "mod_date": "2018-10-15", "pub_date": "2007-11-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in searchr.asp in docusafe 4.1.0 and 4.1.2 allows remote attackers to execute arbitrary sql commands via the artnr parameter (aka the search section). note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in searchr.asp in docusafe 4.1.0 and 4.1.2 allows remote attackers to execute arbitrary sql commands via the artnr parameter (aka the search section). note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-11-16\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2015-2242", "mod_date": "2015-03-10", "pub_date": "2015-03-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in webshop hun 1.062s allow remote attackers to execute arbitrary sql commands via the (1) termid or (2) nyelv_id parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in webshop hun 1.062s allow remote attackers to execute arbitrary sql commands via the (1) termid or (2) nyelv_id parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-03-09\n- Last Modified Date: 2015-03-10" } ] }, { "Unnamed: 0": "CVE-2015-1701", "mod_date": "2018-10-12", "pub_date": "2015-04-21", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "win32k.sys in the kernel-mode drivers in microsoft windows server 2003 sp2, vista sp2, and server 2008 sp2 allows local users to gain privileges via a crafted application, as exploited in the wild in april 2015, aka \"win32k elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: win32k.sys in the kernel-mode drivers in microsoft windows server 2003 sp2, vista sp2, and server 2008 sp2 allows local users to gain privileges via a crafted application, as exploited in the wild in april 2015, aka \"win32k elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2015-04-21\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2008-2177", "mod_date": "2017-09-29", "pub_date": "2008-05-13", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in phpdirectorysource 1.1.06, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) lid parameter to show.php and the (2) login parameter to admin.php.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in phpdirectorysource 1.1.06, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) lid parameter to show.php and the (2) login parameter to admin.php.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-13\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-0446", "mod_date": "2017-09-29", "pub_date": "2008-01-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in voircom.php in lulieblog 1.02 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in voircom.php in lulieblog 1.02 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-25\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-16733", "mod_date": "2018-01-04", "pub_date": "2017-12-20", "cvss": 5.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection issue was discovered in ecava integraxor v 6.1.1030.1 and prior. the sql injection vulnerability has been identified, which an attacker can leverage to disclose sensitive information from the database.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection issue was discovered in ecava integraxor v 6.1.1030.1 and prior. the sql injection vulnerability has been identified, which an attacker can leverage to disclose sensitive information from the database.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-12-20\n- Last Modified Date: 2018-01-04" } ] }, { "Unnamed: 0": "CVE-2014-100003", "mod_date": "2015-03-24", "pub_date": "2015-01-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in includes/ym-download_functions.include.php in the code futures yourmembers plugin for wordpress allows remote attackers to execute arbitrary sql commands via the ym_download_id parameter to the default uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in includes/ym-download_functions.include.php in the code futures yourmembers plugin for wordpress allows remote attackers to execute arbitrary sql commands via the ym_download_id parameter to the default uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-13\n- Last Modified Date: 2015-03-24" } ] }, { "Unnamed: 0": "CVE-2009-3434", "mod_date": "2017-08-17", "pub_date": "2009-09-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the tupinambis (com_tupinambis) component 1.0 for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the proyecto parameter in a verproyecto action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the tupinambis (com_tupinambis) component 1.0 for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the proyecto parameter in a verproyecto action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-28\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2010-4503", "mod_date": "2010-12-09", "pub_date": "2010-12-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in indexlight.php in aigaion 1.3.4 allows remote attackers to execute arbitrary sql commands via the id parameter in an export action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in indexlight.php in aigaion 1.3.4 allows remote attackers to execute arbitrary sql commands via the id parameter in an export action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-12-08\n- Last Modified Date: 2010-12-09" } ] }, { "Unnamed: 0": "CVE-2017-8745", "mod_date": "2017-09-21", "pub_date": "2017-09-13", "cvss": 3.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "an elevation of privilege vulnerability exists in microsoft sharepoint foundation 2013 service pack 1 when it does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint cross site scripting vulnerability\".", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 3.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: an elevation of privilege vulnerability exists in microsoft sharepoint foundation 2013 service pack 1 when it does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint cross site scripting vulnerability\".\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2017-09-13\n- Last Modified Date: 2017-09-21" } ] }, { "Unnamed: 0": "CVE-2015-8157", "mod_date": "2019-09-20", "pub_date": "2016-06-08", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the management server in symantec embedded security: critical system protection (ses:csp) 1.0.x before 1.0 mp5, embedded security: critical system protection for controllers and devices (ses:csp) 6.5.0 before mp1, critical system protection (scsp) before 5.2.9 mp6, data center security: server advanced server (dcs:sa) 6.x before 6.5 mp1 and 6.6 before mp1, and data center security: server advanced server and agents (dcs:sa) through 6.6 mp1 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the management server in symantec embedded security: critical system protection (ses:csp) 1.0.x before 1.0 mp5, embedded security: critical system protection for controllers and devices (ses:csp) 6.5.0 before mp1, critical system protection (scsp) before 5.2.9 mp6, data center security: server advanced server (dcs:sa) 6.x before 6.5 mp1 and 6.6 before mp1, and data center security: server advanced server and agents (dcs:sa) through 6.6 mp1 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-06-08\n- Last Modified Date: 2019-09-20" } ] }, { "Unnamed: 0": "CVE-2012-3554", "mod_date": "2012-08-10", "pub_date": "2012-08-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the rsgallery2 (com_rsgallery2) component before 2.3.0 for joomla! 1.5.x, and before 3.2.0 for joomla! 2.5.x, allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the rsgallery2 (com_rsgallery2) component before 2.3.0 for joomla! 1.5.x, and before 3.2.0 for joomla! 2.5.x, allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-08-10\n- Last Modified Date: 2012-08-10" } ] }, { "Unnamed: 0": "CVE-2008-5163", "mod_date": "2018-10-11", "pub_date": "2008-11-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the rat cms pre-alpha 2 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) viewarticle.php and (2) viewarticle2.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the rat cms pre-alpha 2 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) viewarticle.php and (2) viewarticle2.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-19\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2008-5226", "mod_date": "2017-09-29", "pub_date": "2008-11-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the mambads (com_mambads) component 1.0 rc1 beta and 1.0 rc1 for mambo allows remote attackers to execute arbitrary sql commands via the ma_cat parameter in a view action to index.php, a different vector than cve-2007-5177.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the mambads (com_mambads) component 1.0 rc1 beta and 1.0 rc1 for mambo allows remote attackers to execute arbitrary sql commands via the ma_cat parameter in a view action to index.php, a different vector than cve-2007-5177.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-25\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-7071", "mod_date": "2017-09-29", "pub_date": "2009-08-25", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in authenticate.php in chipmunk topsites allows remote attackers to execute arbitrary sql commands via the username parameter, related to login.php. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in authenticate.php in chipmunk topsites allows remote attackers to execute arbitrary sql commands via the username parameter, related to login.php. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-08-25\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2019-16168", "mod_date": "2019-09-26", "pub_date": "2019-09-09", "cvss": 5.0, "cwe_code": 369, "cwe_name": " Divide By Zero", "summary": "in sqlite through 3.29.0, whereloopaddbtreeindex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a \"severe division by zero in the query planner.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "NONE", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Divide By Zero." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 369:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Divide By Zero\n- Summary: in sqlite through 3.29.0, whereloopaddbtreeindex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a \"severe division by zero in the query planner.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/NONE/PARTIAL\n- Published Date: 2019-09-09\n- Last Modified Date: 2019-09-26" } ] }, { "Unnamed: 0": "CVE-2018-17398", "mod_date": "2019-06-20", "pub_date": "2019-06-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in the amgallery 1.2.3 component for joomla! via the filter_category_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in the amgallery 1.2.3 component for joomla! via the filter_category_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-06-19\n- Last Modified Date: 2019-06-20" } ] }, { "Unnamed: 0": "CVE-2009-4865", "mod_date": "2017-08-17", "pub_date": "2010-05-11", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in escorts_search.php in i-escorts directory script and agency script, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) search_name and (2) languages parameters. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in escorts_search.php in i-escorts directory script and agency script, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) search_name and (2) languages parameters. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-05-11\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2008-6725", "mod_date": "2017-09-29", "pub_date": "2009-04-17", "cvss": 6.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in cmscout 2.06 allow remote authenticated users to execute arbitrary sql commands via the id parameter to (1) index.php in a mythings page (mythings.php) and (2) the users page in admin.php.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in cmscout 2.06 allow remote authenticated users to execute arbitrary sql commands via the id parameter to (1) index.php in a mythings page (mythings.php) and (2) the users page in admin.php.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-4904", "mod_date": "2017-08-08", "pub_date": "2008-11-04", "cvss": 6.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the \"manage pages\" feature (admin/pages) in typo 5.1.3 and earlier allows remote authenticated users with \"blog publisher\" rights to execute arbitrary sql commands via the search[published_at] parameter.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the \"manage pages\" feature (admin/pages) in typo 5.1.3 and earlier allows remote authenticated users with \"blog publisher\" rights to execute arbitrary sql commands via the search[published_at] parameter.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-04\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2005-3365", "mod_date": "2018-10-19", "pub_date": "2005-10-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in dcp-portal 6 and earlier allow remote attackers to execute arbitrary sql commands, possibly requiring encoded characters, via (1) the name parameter in register.php, (2) the email parameter in lostpassword.php, (3) the year parameter in calendar.php, and the (4) cid parameter to index.php. note: the mid parameter for forums.php is already associated with cve-2005-0454. note: the index.php/cid vector was later reported to affect 6.11.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in dcp-portal 6 and earlier allow remote attackers to execute arbitrary sql commands, possibly requiring encoded characters, via (1) the name parameter in register.php, (2) the email parameter in lostpassword.php, (3) the year parameter in calendar.php, and the (4) cid parameter to index.php. note: the mid parameter for forums.php is already associated with cve-2005-0454. note: the index.php/cid vector was later reported to affect 6.11.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-10-30\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2018-6515", "mod_date": "2018-08-02", "pub_date": "2018-06-11", "cvss": 6.8, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "puppet agent 1.10.x prior to 1.10.13, puppet agent 5.3.x prior to 5.3.7, and puppet agent 5.5.x prior to 5.5.2 on windows only, with a specially crafted configuration file an attacker could get pxp-agent to load arbitrary code with privilege escalation.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Improper Input Validation\n- Summary: puppet agent 1.10.x prior to 1.10.13, puppet agent 5.3.x prior to 5.3.7, and puppet agent 5.5.x prior to 5.5.2 on windows only, with a specially crafted configuration file an attacker could get pxp-agent to load arbitrary code with privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-06-11\n- Last Modified Date: 2018-08-02" } ] }, { "Unnamed: 0": "CVE-2006-0123", "mod_date": "2018-10-19", "pub_date": "2006-01-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in adn forum 1.0b allow remote attackers to execute arbitrary sql commands via the (1) fid parameter in index.php and (2) pagid parameter in verpag.php, and possibly other vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in adn forum 1.0b allow remote attackers to execute arbitrary sql commands via the (1) fid parameter in index.php and (2) pagid parameter in verpag.php, and possibly other vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-01-09\n- Last Modified Date: 2018-10-19" } ] }, { "Unnamed: 0": "CVE-2017-6050", "mod_date": "2017-11-08", "pub_date": "2017-06-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection issue was discovered in ecava integraxor versions 5.2.1231.0 and prior. the application fails to properly validate user input, which may allow for an unauthenticated attacker to remotely execute arbitrary code in the form of sql queries.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection issue was discovered in ecava integraxor versions 5.2.1231.0 and prior. the application fails to properly validate user input, which may allow for an unauthenticated attacker to remotely execute arbitrary code in the form of sql queries.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-06-21\n- Last Modified Date: 2017-11-08" } ] }, { "Unnamed: 0": "CVE-2012-5760", "mod_date": "2017-08-29", "pub_date": "2013-02-20", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the webadmin application 6.0.5, 6.0.8, and 7.0 before p2 in ibm netezza allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the webadmin application 6.0.5, 6.0.8, and 7.0 before p2 in ibm netezza allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-02-20\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2009-4206", "mod_date": "2017-09-19", "pub_date": "2009-12-04", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin.link.modify.php in million dollar text links 1.0 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin.link.modify.php in million dollar text links 1.0 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-12-04\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2014-10038", "mod_date": "2017-09-08", "pub_date": "2015-01-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in agenda/indexdate.php in domphp 0.83 and earlier allows remote attackers to execute arbitrary sql commands via the ids parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in agenda/indexdate.php in domphp 0.83 and earlier allows remote attackers to execute arbitrary sql commands via the ids parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-01-13\n- Last Modified Date: 2017-09-08" } ] }, { "Unnamed: 0": "CVE-2012-3873", "mod_date": "2012-12-28", "pub_date": "2012-12-28", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in open constructor 3.12.0 allow remote authenticated users to execute arbitrary sql commands via the id parameter to (1) data/gallery/edit.php, (2) data/guestbook/edit.php, (3) data/file/edit.php, (4) data/htmltext/edit.php, (5) data/publication/edit.php, or (6) data/event/edit.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in open constructor 3.12.0 allow remote authenticated users to execute arbitrary sql commands via the id parameter to (1) data/gallery/edit.php, (2) data/guestbook/edit.php, (3) data/file/edit.php, (4) data/htmltext/edit.php, (5) data/publication/edit.php, or (6) data/event/edit.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-12-28\n- Last Modified Date: 2012-12-28" } ] }, { "Unnamed: 0": "CVE-2013-1803", "mod_date": "2014-05-10", "pub_date": "2014-05-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in php-fusion before 7.02.06 allow remote attackers to execute arbitrary sql commands via the (1) orderby parameter to downloads.php; or remote authenticated users with certain permissions to execute arbitrary sql commands via a (2) parameter name starting with \"delete_attach_\" in an edit action to forum/postedit.php; the (3) poll_opts[] parameter in a newthread action to forum/postnewthread.php; the (4) pm_email_notify, (5) pm_save_sent, (6) pm_inbox, (7) pm_sentbox, or (8) pm_savebox parameter to administration/settings_messages.php; the (9) thumb_compression, (10) photo_watermark_text_color1, (11) photo_watermark_text_color2, or (12) photo_watermark_text_color3 parameter to administration/settings_photo.php; the (13) enable parameter to administration/bbcodes.php; the (14) news_image, (15) news_image_t1, or (16) news_image_t2 parameter to administration/news.php; the (17) news_id parameter in an edit action to administration/news.php; or the (18) article_id parameter in an edit action to administration/articles.php. note: the user id cookie issue in authenticate.class.php is already covered by cve-2013-7375.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in php-fusion before 7.02.06 allow remote attackers to execute arbitrary sql commands via the (1) orderby parameter to downloads.php; or remote authenticated users with certain permissions to execute arbitrary sql commands via a (2) parameter name starting with \"delete_attach_\" in an edit action to forum/postedit.php; the (3) poll_opts[] parameter in a newthread action to forum/postnewthread.php; the (4) pm_email_notify, (5) pm_save_sent, (6) pm_inbox, (7) pm_sentbox, or (8) pm_savebox parameter to administration/settings_messages.php; the (9) thumb_compression, (10) photo_watermark_text_color1, (11) photo_watermark_text_color2, or (12) photo_watermark_text_color3 parameter to administration/settings_photo.php; the (13) enable parameter to administration/bbcodes.php; the (14) news_image, (15) news_image_t1, or (16) news_image_t2 parameter to administration/news.php; the (17) news_id parameter in an edit action to administration/news.php; or the (18) article_id parameter in an edit action to administration/articles.php. note: the user id cookie issue in authenticate.class.php is already covered by cve-2013-7375.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-05-05\n- Last Modified Date: 2014-05-10" } ] }, { "Unnamed: 0": "CVE-2009-4783", "mod_date": "2018-10-10", "pub_date": "2010-04-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in theeta cms, possibly 0.01, allow remote attackers to execute arbitrary sql commands via the start parameter to (1) forum.php and (2) thread.php in community/, and (3) blog/index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in theeta cms, possibly 0.01, allow remote attackers to execute arbitrary sql commands via the start parameter to (1) forum.php and (2) thread.php in community/, and (3) blog/index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-21\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2009-2345", "mod_date": "2009-07-08", "pub_date": "2009-07-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in clansphere before 2009.0.1 allow remote attackers to execute arbitrary sql commands via unknown parameters to the gbook module and unspecified other components.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in clansphere before 2009.0.1 allow remote attackers to execute arbitrary sql commands via unknown parameters to the gbook module and unspecified other components.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-07\n- Last Modified Date: 2009-07-08" } ] }, { "Unnamed: 0": "CVE-2018-17391", "mod_date": "2018-11-14", "pub_date": "2018-09-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection exists in authors_post.php in super cms blog pro 1.0 via the author parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection exists in authors_post.php in super cms blog pro 1.0 via the author parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-09-28\n- Last Modified Date: 2018-11-14" } ] }, { "Unnamed: 0": "CVE-2008-4991", "mod_date": "2017-08-08", "pub_date": "2008-11-06", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in lockon co.,ltd. ec-cube 2.3.0 and earlier, 1.4.7 and earlier, and 1.5.0-beta2 and earlier; and community edition 1.3.5 and earlier allows remote attackers to execute arbitrary sql commands via the parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in lockon co.,ltd. ec-cube 2.3.0 and earlier, 1.4.7 and earlier, and 1.5.0-beta2 and earlier; and community edition 1.3.5 and earlier allows remote attackers to execute arbitrary sql commands via the parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-11-06\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2017-6767", "mod_date": "2019-10-03", "pub_date": "2017-08-17", "cvss": 4.6, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "a vulnerability in cisco application policy infrastructure controller (apic) could allow an authenticated, remote attacker to gain higher privileges than the account is assigned. the attacker will be granted the privileges of the last user to log in, regardless of whether those privileges are higher or lower than what should have been granted. the attacker cannot gain root-level privileges. the vulnerability is due to a limitation with how role-based access control (rbac) grants privileges to remotely authenticated users when login occurs via ssh directly to the local management interface of the apic. an attacker could exploit this vulnerability by authenticating to the targeted device. the attacker's privilege level will be modified to match that of the last user to log in via ssh. an exploit could allow the attacker to gain elevated privileges and perform cli commands that should be restricted by the attacker's configured role. cisco bug ids: cscvc34335. known affected releases: 1.0(1e), 1.0(1h), 1.0(1k), 1.0(1n), 1.0(2j), 1.0(2m), 1.0(3f), 1.0(3i), 1.0(3k), 1.0(3n), 1.0(4h), 1.0(4o); 1.1(0.920a), 1.1(1j), 1.1(3f); 1.2 base, 1.2(2), 1.2(3), 1.2.2; 1.3(1), 1.3(2), 1.3(2f); 2.0 base, 2.0(1).", "access_authentication": "SINGLE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.6\n- CWE Name: Improper Privilege Management\n- Summary: a vulnerability in cisco application policy infrastructure controller (apic) could allow an authenticated, remote attacker to gain higher privileges than the account is assigned. the attacker will be granted the privileges of the last user to log in, regardless of whether those privileges are higher or lower than what should have been granted. the attacker cannot gain root-level privileges. the vulnerability is due to a limitation with how role-based access control (rbac) grants privileges to remotely authenticated users when login occurs via ssh directly to the local management interface of the apic. an attacker could exploit this vulnerability by authenticating to the targeted device. the attacker's privilege level will be modified to match that of the last user to log in via ssh. an exploit could allow the attacker to gain elevated privileges and perform cli commands that should be restricted by the attacker's configured role. cisco bug ids: cscvc34335. known affected releases: 1.0(1e), 1.0(1h), 1.0(1k), 1.0(1n), 1.0(2j), 1.0(2m), 1.0(3f), 1.0(3i), 1.0(3k), 1.0(3n), 1.0(4h), 1.0(4o); 1.1(0.920a), 1.1(1j), 1.1(3f); 1.2 base, 1.2(2), 1.2(3), 1.2.2; 1.3(1), 1.3(2), 1.3(2f); 2.0 base, 2.0(1).\n- Access Authentication: SINGLE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-08-17\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2009-3582", "mod_date": "2018-10-10", "pub_date": "2009-12-23", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the delete subroutine in sql-ledger 2.8.24 allow remote authenticated users to execute arbitrary sql commands via the (1) id and possibly (2) db parameters in a delete action to the output of a vendors>reports>search search operation.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the delete subroutine in sql-ledger 2.8.24 allow remote authenticated users to execute arbitrary sql commands via the (1) id and possibly (2) db parameters in a delete action to the output of a vendors>reports>search search operation.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-12-23\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2008-2504", "mod_date": "2017-09-29", "pub_date": "2008-05-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in simpel side netbutik 1 through 4 allow remote attackers to execute arbitrary sql commands via the (1) cat parameter to netbutik.php and the (2) id parameter to product.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in simpel side netbutik 1 through 4 allow remote attackers to execute arbitrary sql commands via the (1) cat parameter to netbutik.php and the (2) id parameter to product.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-29\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2008-0327", "mod_date": "2017-09-29", "pub_date": "2008-01-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in show.php in fascript famp3 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in show.php in fascript famp3 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-01-17\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2009-3754", "mod_date": "2017-09-19", "pub_date": "2009-10-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in phpbms 0.96 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to modules/bms/invoices_discount_ajax.php, (2) f parameter to dbgraphic.php, and (3) tid parameter in a show action to advancedsearch.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in phpbms 0.96 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to modules/bms/invoices_discount_ajax.php, (2) f parameter to dbgraphic.php, and (3) tid parameter in a show action to advancedsearch.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-10-22\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2014-7959", "mod_date": "2018-10-09", "pub_date": "2014-11-06", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in admin/htaccess/bpsunlock.php in the bulletproof security plugin before .51.1 for wordpress allows remote authenticated users to execute arbitrary sql commands via the tableprefix parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in admin/htaccess/bpsunlock.php in the bulletproof security plugin before .51.1 for wordpress allows remote authenticated users to execute arbitrary sql commands via the tableprefix parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-11-06\n- Last Modified Date: 2018-10-09" } ] }, { "Unnamed: 0": "CVE-2008-2197", "mod_date": "2017-09-29", "pub_date": "2008-05-14", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the blogwriter module 2.0 for miniweb allows remote attackers to execute arbitrary sql commands via the historymonth parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the blogwriter module 2.0 for miniweb allows remote attackers to execute arbitrary sql commands via the historymonth parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-14\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-17305", "mod_date": "2019-10-03", "pub_date": "2019-04-11", "cvss": 6.5, "cwe_code": 732, "cwe_name": " Incorrect Permission Assignment for Critical Resource", "summary": "uipath orchestrator through 2018.2.4 allows any authenticated user to change the information of arbitrary users (even administrators) leading to privilege escalation and remote code execution.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 732:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Incorrect Permission Assignment for Critical Resource\n- Summary: uipath orchestrator through 2018.2.4 allows any authenticated user to change the information of arbitrary users (even administrators) leading to privilege escalation and remote code execution.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-04-11\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2017-16961", "mod_date": "2017-12-07", "pub_date": "2017-11-27", "cvss": 4.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability in core/inc/auto-modules.php in bigtree cms through 4.2.19 allows remote authenticated attackers to obtain information in the context of the user used by the application to retrieve data from the database. the attack uses an admin/trees/add/process request with a crafted _tags[] parameter that is mishandled in a later admin/ajax/dashboard/approve-change request.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability in core/inc/auto-modules.php in bigtree cms through 4.2.19 allows remote authenticated attackers to obtain information in the context of the user used by the application to retrieve data from the database. the attack uses an admin/trees/add/process request with a crafted _tags[] parameter that is mishandled in a later admin/ajax/dashboard/approve-change request.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-11-27\n- Last Modified Date: 2017-12-07" } ] }, { "Unnamed: 0": "CVE-2010-0340", "mod_date": "2011-04-29", "pub_date": "2010-01-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the mjs event pro (mjseventpro) extension 0.2.1 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the mjs event pro (mjseventpro) extension 0.2.1 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-15\n- Last Modified Date: 2011-04-29" } ] }, { "Unnamed: 0": "CVE-2018-14012", "mod_date": "2018-09-05", "pub_date": "2018-07-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "wolfsight cms 3.2 allows sql injection via the path_info to the default uri.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: wolfsight cms 3.2 allows sql injection via the path_info to the default uri.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-07-12\n- Last Modified Date: 2018-09-05" } ] }, { "Unnamed: 0": "CVE-2010-4641", "mod_date": "2017-08-17", "pub_date": "2010-12-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in xwiki enterprise before 2.5 allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in xwiki enterprise before 2.5 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-12-30\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2016-5792", "mod_date": "2016-11-28", "pub_date": "2016-08-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in moxa softcms before 1.5 allows remote attackers to execute arbitrary sql commands via unspecified fields.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in moxa softcms before 1.5 allows remote attackers to execute arbitrary sql commands via unspecified fields.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-08-08\n- Last Modified Date: 2016-11-28" } ] }, { "Unnamed: 0": "CVE-2015-1713", "mod_date": "2018-10-12", "pub_date": "2015-05-13", "cvss": 6.8, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "microsoft internet explorer 11 allows remote attackers to gain privileges via a crafted web site, aka \"internet explorer elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.8\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: microsoft internet explorer 11 allows remote attackers to gain privileges via a crafted web site, aka \"internet explorer elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-05-13\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2019-1779", "mod_date": "2019-05-21", "pub_date": "2019-05-15", "cvss": 7.2, "cwe_code": 77, "cwe_name": " Improper Neutralization of Special Elements used in a Command ('Command Injection')", "summary": "a vulnerability in the cli of cisco fxos software and cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device with elevated privileges. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid device credentials to exploit this vulnerability.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in a Command ('Command Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 77:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')\n- Summary: a vulnerability in the cli of cisco fxos software and cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device with elevated privileges. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid device credentials to exploit this vulnerability.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-05-15\n- Last Modified Date: 2019-05-21" } ] }, { "Unnamed: 0": "CVE-2018-19725", "mod_date": "2019-10-10", "pub_date": "2019-03-05", "cvss": 10.0, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "adobe acrobat and reader versions 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a security bypass vulnerability. successful exploitation could lead to privilege escalation.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 10.0\n- CWE Name: Improper Privilege Management\n- Summary: adobe acrobat and reader versions 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a security bypass vulnerability. successful exploitation could lead to privilege escalation.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-03-05\n- Last Modified Date: 2019-10-10" } ] }, { "Unnamed: 0": "CVE-2009-2230", "mod_date": "2017-09-19", "pub_date": "2009-06-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in inc/datahandlers/user.php in mybb (aka mybulletinboard) before 1.4.7 allows remote authenticated users to execute arbitrary sql commands via the birthdayprivacy parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in inc/datahandlers/user.php in mybb (aka mybulletinboard) before 1.4.7 allows remote authenticated users to execute arbitrary sql commands via the birthdayprivacy parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-06-26\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2006-1330", "mod_date": "2018-10-18", "pub_date": "2006-03-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in phpwebsite 0.83 and earlier allow remote attackers to execute arbitrary sql commands via the sid parameter to (1) friend.php or (2) article.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in phpwebsite 0.83 and earlier allow remote attackers to execute arbitrary sql commands via the sid parameter to (1) friend.php or (2) article.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2006-03-21\n- Last Modified Date: 2018-10-18" } ] }, { "Unnamed: 0": "CVE-2017-14508", "mod_date": "2017-12-30", "pub_date": "2017-09-17", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in sugarcrm before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and sugar community edition 6.5.26). several areas have been identified in the documents and emails module that could allow an authenticated user to perform sql injection, as demonstrated by a backslash character at the end of a bean_id to modules/emails/detailview.php. an attacker could exploit these vulnerabilities by sending a crafted sql request to the affected areas. an exploit could allow the attacker to modify the sql database. proper sql escaping has been added to prevent such exploits.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in sugarcrm before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and sugar community edition 6.5.26). several areas have been identified in the documents and emails module that could allow an authenticated user to perform sql injection, as demonstrated by a backslash character at the end of a bean_id to modules/emails/detailview.php. an attacker could exploit these vulnerabilities by sending a crafted sql request to the affected areas. an exploit could allow the attacker to modify the sql database. proper sql escaping has been added to prevent such exploits.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-09-17\n- Last Modified Date: 2017-12-30" } ] }, { "Unnamed: 0": "CVE-2018-0911", "mod_date": "2019-10-03", "pub_date": "2018-03-14", "cvss": 6.5, "cwe_code": 79, "cwe_name": " Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "summary": "microsoft project server 2013 sp1 and microsoft sharepoint enterprise server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka \"microsoft sharepoint elevation of privilege vulnerability\". this cve is unique from cve-2018-0909, cve-2018-0910, cve-2018-0912, cve-2018-0913, cve-2018-0914, cve-2018-0915, cve-2018-0916, cve-2018-0917, cve-2018-0921, cve-2018-0923, cve-2018-0944 and cve-2018-0947.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 79:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n- Summary: microsoft project server 2013 sp1 and microsoft sharepoint enterprise server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka \"microsoft sharepoint elevation of privilege vulnerability\". this cve is unique from cve-2018-0909, cve-2018-0910, cve-2018-0912, cve-2018-0913, cve-2018-0914, cve-2018-0915, cve-2018-0916, cve-2018-0917, cve-2018-0921, cve-2018-0923, cve-2018-0944 and cve-2018-0947.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-03-14\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2015-7564", "mod_date": "2017-04-20", "pub_date": "2017-04-12", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in teampass 2.1.24 and earlier allow remote attackers to execute arbitrary sql commands via the (1) id parameter in an action_on_quick_icon action to item.query.php or the (2) order or (3) direction parameter in an (a) connections_logs, (b) errors_logs or (c) access_logs action to view.query.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in teampass 2.1.24 and earlier allow remote attackers to execute arbitrary sql commands via the (1) id parameter in an action_on_quick_icon action to item.query.php or the (2) order or (3) direction parameter in an (a) connections_logs, (b) errors_logs or (c) access_logs action to view.query.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-04-12\n- Last Modified Date: 2017-04-20" } ] }, { "Unnamed: 0": "CVE-2014-3757", "mod_date": "2015-10-21", "pub_date": "2014-05-15", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in sorter.php in the phpmanufaktur kitform extension 0.43 and earlier for the keepintouch (kit) module allows remote attackers to execute arbitrary sql commands via the sorter_value parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in sorter.php in the phpmanufaktur kitform extension 0.43 and earlier for the keepintouch (kit) module allows remote attackers to execute arbitrary sql commands via the sorter_value parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-05-15\n- Last Modified Date: 2015-10-21" } ] }, { "Unnamed: 0": "CVE-2008-6980", "mod_date": "2018-10-11", "pub_date": "2009-08-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in as_archives.php in phpadultsite cms, possibly 2.3.2, allows remote attackers to execute arbitrary sql commands via the results_per_page parameter to index.php. note: some of these details are obtained from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in as_archives.php in phpadultsite cms, possibly 2.3.2, allows remote attackers to execute arbitrary sql commands via the results_per_page parameter to index.php. note: some of these details are obtained from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-08-19\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2017-17577", "mod_date": "2017-12-20", "pub_date": "2017-12-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "fs trademe clone 1.0 has sql injection via the search_item.php search parameter or the general_item_details.php id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: fs trademe clone 1.0 has sql injection via the search_item.php search parameter or the general_item_details.php id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-12-13\n- Last Modified Date: 2017-12-20" } ] }, { "Unnamed: 0": "CVE-2016-7784", "mod_date": "2017-07-28", "pub_date": "2017-03-07", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the getsection function in framework/core/subsystems/exprouter.php in exponent cms 2.3.9 and earlier allows remote attackers to execute arbitrary sql commands via the section parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the getsection function in framework/core/subsystems/exprouter.php in exponent cms 2.3.9 and earlier allows remote attackers to execute arbitrary sql commands via the section parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-03-07\n- Last Modified Date: 2017-07-28" } ] }, { "Unnamed: 0": "CVE-2016-0197", "mod_date": "2018-10-12", "pub_date": "2016-05-11", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "dxgkrnl.sys in the directx graphics kernel subsystem in the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"microsoft directx graphics kernel subsystem elevation of privilege vulnerability.\"", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: dxgkrnl.sys in the directx graphics kernel subsystem in the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"microsoft directx graphics kernel subsystem elevation of privilege vulnerability.\"\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2016-05-11\n- Last Modified Date: 2018-10-12" } ] }, { "Unnamed: 0": "CVE-2019-15562", "mod_date": "2019-08-27", "pub_date": "2019-08-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "gorm before 1.9.10 allows sql injection via incomplete parentheses.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: gorm before 1.9.10 allows sql injection via incomplete parentheses.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-08-26\n- Last Modified Date: 2019-08-27" } ] }, { "Unnamed: 0": "CVE-2013-0123", "mod_date": "2013-03-22", "pub_date": "2013-03-21", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in the administration interface in askia askiaweb allow remote attackers to execute arbitrary sql commands via (1) the nhistoryid parameter to webprod/pages/pghistory.asp or (2) the orderby parameter to webprod/pages/pgadmin.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in the administration interface in askia askiaweb allow remote attackers to execute arbitrary sql commands via (1) the nhistoryid parameter to webprod/pages/pghistory.asp or (2) the orderby parameter to webprod/pages/pgadmin.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-03-21\n- Last Modified Date: 2013-03-22" } ] }, { "Unnamed: 0": "CVE-2008-6392", "mod_date": "2017-08-17", "pub_date": "2009-03-02", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in showads.php in z1exchange allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in showads.php in z1exchange allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-02\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2018-1141", "mod_date": "2019-10-03", "pub_date": "2018-03-20", "cvss": 4.4, "cwe_code": 732, "cwe_name": " Incorrect Permission Assignment for Critical Resource", "summary": "when installing nessus to a directory outside of the default location, nessus versions prior to 7.0.3 did not enforce secure permissions for sub-directories. this could allow for local privilege escalation if users had not secured the directories in the installation location.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "LOCAL", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 732:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 4.4\n- CWE Name: Incorrect Permission Assignment for Critical Resource\n- Summary: when installing nessus to a directory outside of the default location, nessus versions prior to 7.0.3 did not enforce secure permissions for sub-directories. this could allow for local privilege escalation if users had not secured the directories in the installation location.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-03-20\n- Last Modified Date: 2019-10-03" } ] }, { "Unnamed: 0": "CVE-2018-6230", "mod_date": "2018-04-04", "pub_date": "2018-03-15", "cvss": 8.3, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability in an trend micro email encryption gateway 5.5 search configuration script could allow an attacker to execute sql commands to upload and execute arbitrary code that may harm the target system.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "ADJACENT_NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 8.3\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability in an trend micro email encryption gateway 5.5 search configuration script could allow an attacker to execute sql commands to upload and execute arbitrary code that may harm the target system.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: ADJACENT_NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2018-03-15\n- Last Modified Date: 2018-04-04" } ] }, { "Unnamed: 0": "CVE-2008-2038", "mod_date": "2017-08-08", "pub_date": "2008-04-30", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in admin/adminindex.php in turnkey web tools sunshop shopping cart 4.1.0 allow remote authenticated administrators to execute arbitrary sql commands via the (1) orderby and (2) sort parameters. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in admin/adminindex.php in turnkey web tools sunshop shopping cart 4.1.0 allow remote authenticated administrators to execute arbitrary sql commands via the (1) orderby and (2) sort parameters. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-04-30\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2016-8449", "mod_date": "2017-10-19", "pub_date": "2017-01-12", "cvss": 7.6, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31798848. references: n-cve-2016-8449.", "access_authentication": "NONE", "access_complexity": "HIGH", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.6\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31798848. references: n-cve-2016-8449.\n- Access Authentication: NONE\n- Access Complexity: HIGH\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2017-01-12\n- Last Modified Date: 2017-10-19" } ] }, { "Unnamed: 0": "CVE-2014-5109", "mod_date": "2017-08-29", "pub_date": "2014-07-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in maint/modules/endpointcfg/endpoint_generic.php in fonality trixbox allows remote attackers to execute arbitrary sql commands via the mac parameter in a submit action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in maint/modules/endpointcfg/endpoint_generic.php in fonality trixbox allows remote attackers to execute arbitrary sql commands via the mac parameter in a submit action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2014-07-28\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2016-10951", "mod_date": "2019-09-16", "pub_date": "2019-09-13", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "the fs-shopping-cart plugin 2.07.02 for wordpress has sql injection via the pid parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: the fs-shopping-cart plugin 2.07.02 for wordpress has sql injection via the pid parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-09-13\n- Last Modified Date: 2019-09-16" } ] }, { "Unnamed: 0": "CVE-2017-14600", "mod_date": "2017-09-22", "pub_date": "2017-09-19", "cvss": 4.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "pragyan cms v3.0 is vulnerable to an error-based sql injection in cms/admin.lib.php via $_get['del_black'], resulting in information disclosure.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 4.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: pragyan cms v3.0 is vulnerable to an error-based sql injection in cms/admin.lib.php via $_get['del_black'], resulting in information disclosure.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2017-09-19\n- Last Modified Date: 2017-09-22" } ] }, { "Unnamed: 0": "CVE-2012-1778", "mod_date": "2017-08-29", "pub_date": "2012-03-19", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in artykul_print.php in createvision cms allows remote attackers to execute arbitrary sql commands via the id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in artykul_print.php in createvision cms allows remote attackers to execute arbitrary sql commands via the id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-03-19\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2009-2326", "mod_date": "2017-09-19", "pub_date": "2009-07-05", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in kervinet forum 1.1 and earlier allow remote attackers to execute arbitrary sql commands via (1) an enter_parol cookie to index.php in an auto action or (2) the topic parameter to message.php. note: vector 2 can be leveraged for a cross-site scripting (xss) attack.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in kervinet forum 1.1 and earlier allow remote attackers to execute arbitrary sql commands via (1) an enter_parol cookie to index.php in an auto action or (2) the topic parameter to message.php. note: vector 2 can be leveraged for a cross-site scripting (xss) attack.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-07-05\n- Last Modified Date: 2017-09-19" } ] }, { "Unnamed: 0": "CVE-2007-5704", "mod_date": "2018-10-15", "pub_date": "2007-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in codewidgets.com online event registration template allow remote attackers to execute arbitrary sql commands via the (1) email address and (2) password fields in (a) login.asp and (b) admin_login.asp.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in codewidgets.com online event registration template allow remote attackers to execute arbitrary sql commands via the (1) email address and (2) password fields in (a) login.asp and (b) admin_login.asp.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-10-29\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2009-2157", "mod_date": "2018-10-10", "pub_date": "2009-06-22", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in torrenttrader classic 1.09 allow remote authenticated users to execute arbitrary sql commands via (1) the origmsg parameter to account-inbox.php; the categ parameter to (2) delreq.php and (3) admin-delreq.php; (4) the choice parameter to index.php; (5) the id parameter to modrules.php in an edited (aka edit) action; the (6) user, (7) torrent, (8) forumid, and (9) forumpost parameters to report.php; (10) the delmp parameter to take-deletepm.php; (11) the delreport parameter to takedelreport.php; (12) the delreq parameter to takedelreq.php; (13) the clases parameter to takestaffmess.php; and (14) the warndisable parameter to takewarndisable.php; and allow remote attackers to execute arbitrary sql commands via (15) the wherecatin parameter to browse.php, (16) the limit parameter to today.php, and (17) the where parameter to torrents-details.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in torrenttrader classic 1.09 allow remote authenticated users to execute arbitrary sql commands via (1) the origmsg parameter to account-inbox.php; the categ parameter to (2) delreq.php and (3) admin-delreq.php; (4) the choice parameter to index.php; (5) the id parameter to modrules.php in an edited (aka edit) action; the (6) user, (7) torrent, (8) forumid, and (9) forumpost parameters to report.php; (10) the delmp parameter to take-deletepm.php; (11) the delreport parameter to takedelreport.php; (12) the delreq parameter to takedelreq.php; (13) the clases parameter to takestaffmess.php; and (14) the warndisable parameter to takewarndisable.php; and allow remote attackers to execute arbitrary sql commands via (15) the wherecatin parameter to browse.php, (16) the limit parameter to today.php, and (17) the where parameter to torrents-details.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-06-22\n- Last Modified Date: 2018-10-10" } ] }, { "Unnamed: 0": "CVE-2008-6471", "mod_date": "2017-09-29", "pub_date": "2009-03-13", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in detail.php in mountaingrafix easylink 1.1.0 allows remote attackers to execute arbitrary sql commands via the cat parameter in a show action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in detail.php in mountaingrafix easylink 1.1.0 allows remote attackers to execute arbitrary sql commands via the cat parameter in a show action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-03-13\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2018-17562", "mod_date": "2018-11-21", "pub_date": "2018-10-03", "cvss": 5.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multi-tech faxfinder before 5.1.6 has sql injection via a status/call_details?oid= uri, allowing an attacker to extract the underlying database schema to further disclose other fax server information through different injection points.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "NONE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multi-tech faxfinder before 5.1.6 has sql injection via a status/call_details?oid= uri, allowing an attacker to extract the underlying database schema to further disclose other fax server information through different injection points.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/NONE/NONE\n- Published Date: 2018-10-03\n- Last Modified Date: 2018-11-21" } ] }, { "Unnamed: 0": "CVE-2019-1606", "mod_date": "2019-10-09", "pub_date": "2019-03-08", "cvss": 7.2, "cwe_code": 77, "cwe_name": " Improper Neutralization of Special Elements used in a Command ('Command Injection')", "summary": "a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid user credentials to exploit this vulnerability. nexus 3000, 3500, and nexus 9000 series switches in standalone nx-os mode are affected in versions prior to 7.0(3)i7(4).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in a Command ('Command Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 77:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')\n- Summary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid user credentials to exploit this vulnerability. nexus 3000, 3500, and nexus 9000 series switches in standalone nx-os mode are affected in versions prior to 7.0(3)i7(4).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-03-08\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2010-1529", "mod_date": "2017-08-17", "pub_date": "2010-04-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the freestyle faqs lite (com_fsf) component, possibly 1.3, for joomla! allows remote attackers to execute arbitrary sql commands via the faqid parameter in an faq action to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the freestyle faqs lite (com_fsf) component, possibly 1.3, for joomla! allows remote attackers to execute arbitrary sql commands via the faqid parameter in an faq action to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-04-26\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2018-3811", "mod_date": "2018-01-16", "pub_date": "2018-01-01", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the oturia smart google code inserter plugin before 3.5 for wordpress allows unauthenticated attackers to execute sql queries in the context of the web server. the savegoogleadwords() function in smartgooglecode.php did not use prepared statements and did not sanitize the $_post[\"oid\"] variable before passing it as input into the sql query.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the oturia smart google code inserter plugin before 3.5 for wordpress allows unauthenticated attackers to execute sql queries in the context of the web server. the savegoogleadwords() function in smartgooglecode.php did not use prepared statements and did not sanitize the $_post[\"oid\"] variable before passing it as input into the sql query.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2018-01-01\n- Last Modified Date: 2018-01-16" } ] }, { "Unnamed: 0": "CVE-2008-1272", "mod_date": "2017-09-29", "pub_date": "2008-03-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in bm classifieds 20080309 and earlier allow remote attackers to execute arbitrary sql commands via the (1) cat parameter to showad.php and the (2) ad parameter to pfriendly.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in bm classifieds 20080309 and earlier allow remote attackers to execute arbitrary sql commands via the (1) cat parameter to showad.php and the (2) ad parameter to pfriendly.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-10\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-15961", "mod_date": "2017-11-17", "pub_date": "2017-10-29", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "iproject management system 1.0 allows sql injection via the id parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: iproject management system 1.0 allows sql injection via the id parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-10-29\n- Last Modified Date: 2017-11-17" } ] }, { "Unnamed: 0": "CVE-2018-16188", "mod_date": "2019-02-08", "pub_date": "2019-01-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the ricoh interactive whiteboard d2200 v1.3 to v2.2, d5500 v1.3 to v2.2, d5510 v1.3 to v2.2, the display versions with ricoh interactive whiteboard controller type1 v1.3 to v2.2 attached (d5520, d6500, d6510, d7500, d8400), and the display versions with ricoh interactive whiteboard controller type2 v3.0 to v3.1.10137.0 attached (d5520, d6510, d7500, d8400) allows remote attackers to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the ricoh interactive whiteboard d2200 v1.3 to v2.2, d5500 v1.3 to v2.2, d5510 v1.3 to v2.2, the display versions with ricoh interactive whiteboard controller type1 v1.3 to v2.2 attached (d5520, d6500, d6510, d7500, d8400), and the display versions with ricoh interactive whiteboard controller type2 v3.0 to v3.1.10137.0 attached (d5520, d6510, d7500, d8400) allows remote attackers to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-01-09\n- Last Modified Date: 2019-02-08" } ] }, { "Unnamed: 0": "CVE-2019-9745", "mod_date": "2019-10-21", "pub_date": "2019-10-14", "cvss": 7.2, "cwe_code": 269, "cwe_name": " Improper Privilege Management", "summary": "cloudcti hip integrator recognition configuration tool allows privilege escalation via its exquise integration. this tool communicates with a service (recognition update client service) via an insecure communication channel (named pipe). the data (json) sent via this channel is used to import data from crm software using plugins (.dll files). the plugin to import data from the exquise software (datasourceexquiseexporter.dll) can be persuaded to start arbitrary programs (including batch files) that are executed using the same privileges as recognition update client service (nt authority\\system), thus elevating privileges. this occurs because a higher-privileged process executes scripts from a directory writable by a lower-privileged user.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Privilege Management." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 269:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Improper Privilege Management\n- Summary: cloudcti hip integrator recognition configuration tool allows privilege escalation via its exquise integration. this tool communicates with a service (recognition update client service) via an insecure communication channel (named pipe). the data (json) sent via this channel is used to import data from crm software using plugins (.dll files). the plugin to import data from the exquise software (datasourceexquiseexporter.dll) can be persuaded to start arbitrary programs (including batch files) that are executed using the same privileges as recognition update client service (nt authority\\system), thus elevating privileges. this occurs because a higher-privileged process executes scripts from a directory writable by a lower-privileged user.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-10-14\n- Last Modified Date: 2019-10-21" } ] }, { "Unnamed: 0": "CVE-2019-8422", "mod_date": "2019-02-19", "pub_date": "2019-02-17", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection vulnerability exists in pbootcms v1.3.2 via the description parameter in apps\\admin\\controller\\content\\contentcontroller.php.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection vulnerability exists in pbootcms v1.3.2 via the description parameter in apps\\admin\\controller\\content\\contentcontroller.php.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-02-17\n- Last Modified Date: 2019-02-19" } ] }, { "Unnamed: 0": "CVE-2007-6318", "mod_date": "2018-10-15", "pub_date": "2007-12-12", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in wp-includes/query.php in wordpress 2.3.1 and earlier allows remote attackers to execute arbitrary sql commands via the s parameter, when db_charset is set to (1) big5, (2) gbk, or possibly other character set encodings that support a \"\\\" in a multibyte character.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in wp-includes/query.php in wordpress 2.3.1 and earlier allows remote attackers to execute arbitrary sql commands via the s parameter, when db_charset is set to (1) big5, (2) gbk, or possibly other character set encodings that support a \"\\\" in a multibyte character.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-12-12\n- Last Modified Date: 2018-10-15" } ] }, { "Unnamed: 0": "CVE-2016-10839", "mod_date": "2019-08-13", "pub_date": "2019-08-01", "cvss": 5.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "cpanel before 11.54.0.4 allows sql injection in bin/horde_update_usernames (sec-71).", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: cpanel before 11.54.0.4 allows sql injection in bin/horde_update_usernames (sec-71).\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/NONE\n- Published Date: 2019-08-01\n- Last Modified Date: 2019-08-13" } ] }, { "Unnamed: 0": "CVE-2008-4498", "mod_date": "2017-09-29", "pub_date": "2008-10-09", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in searchresults.php in php autos 2.9.1 allows remote attackers to execute arbitrary sql commands via the catid parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in searchresults.php in php autos 2.9.1 allows remote attackers to execute arbitrary sql commands via the catid parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-10-09\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2017-6575", "mod_date": "2019-03-19", "pub_date": "2017-03-09", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "a sql injection issue is exploitable, with wordpress admin access, in the mail masta (aka mail-masta) plugin 1.0 for wordpress. this affects ./inc/lists/edit_member.php with the get parameter: member_id.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: a sql injection issue is exploitable, with wordpress admin access, in the mail masta (aka mail-masta) plugin 1.0 for wordpress. this affects ./inc/lists/edit_member.php with the get parameter: member_id.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-03-09\n- Last Modified Date: 2019-03-19" } ] }, { "Unnamed: 0": "CVE-2019-13146", "mod_date": "2019-07-16", "pub_date": "2019-07-09", "cvss": 5.0, "cwe_code": 20, "cwe_name": " Improper Input Validation", "summary": "the field_test gem 0.3.0 for ruby has unvalidated input. a method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. if an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like sql injection or cross-site scripting (xss).", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "NONE", "impact_confidentiality": "NONE", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Input Validation." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 20:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 5.0\n- CWE Name: Improper Input Validation\n- Summary: the field_test gem 0.3.0 for ruby has unvalidated input. a method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. if an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like sql injection or cross-site scripting (xss).\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): NONE/PARTIAL/NONE\n- Published Date: 2019-07-09\n- Last Modified Date: 2019-07-16" } ] }, { "Unnamed: 0": "CVE-2019-12251", "mod_date": "2019-05-21", "pub_date": "2019-05-21", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sadmin/ceditpost.php in ucms 1.4.7 allows sql injection via the index.php?do=sadmin_ceditpost cvalue parameter.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sadmin/ceditpost.php in ucms 1.4.7 allows sql injection via the index.php?do=sadmin_ceditpost cvalue parameter.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-05-21\n- Last Modified Date: 2019-05-21" } ] }, { "Unnamed: 0": "CVE-2008-4046", "mod_date": "2017-08-08", "pub_date": "2008-09-11", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in elitecms 1.0 allows remote attackers to execute arbitrary sql commands via the page parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in elitecms 1.0 allows remote attackers to execute arbitrary sql commands via the page parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-09-11\n- Last Modified Date: 2017-08-08" } ] }, { "Unnamed: 0": "CVE-2019-12683", "mod_date": "2019-10-09", "pub_date": "2019-10-02", "cvss": 9.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple vulnerabilities in the web-based management interface of cisco firepower management center (fmc) software could allow an authenticated, remote attacker to execute arbitrary sql injections on an affected device. these vulnerabilities exist due to improper input validation. an attacker could exploit these vulnerabilities by sending crafted sql queries to an affected device. a successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 9.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple vulnerabilities in the web-based management interface of cisco firepower management center (fmc) software could allow an authenticated, remote attacker to execute arbitrary sql injections on an affected device. these vulnerabilities exist due to improper input validation. an attacker could exploit these vulnerabilities by sending crafted sql queries to an affected device. a successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-10-02\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2008-1408", "mod_date": "2017-09-29", "pub_date": "2008-03-20", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in includes/functions/banners-external.php in phpbp 2 rc3 (2.204) fix 4 allows remote attackers to execute arbitrary sql commands via the id parameter in a banner_out action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in includes/functions/banners-external.php in phpbp 2 rc3 (2.204) fix 4 allows remote attackers to execute arbitrary sql commands via the id parameter in a banner_out action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-03-20\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2016-1000000", "mod_date": "2017-11-03", "pub_date": "2016-10-06", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "ipswitch whatsup gold 16.4.1 wrfreeformtext.asp suniqueid parameter blind sql injection", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: ipswitch whatsup gold 16.4.1 wrfreeformtext.asp suniqueid parameter blind sql injection\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2016-10-06\n- Last Modified Date: 2017-11-03" } ] }, { "Unnamed: 0": "CVE-2008-2457", "mod_date": "2017-09-29", "pub_date": "2008-05-27", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in jokes_category.php in php-jokesite 2.0 allows remote attackers to execute arbitrary sql commands via the cat_id parameter.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in jokes_category.php in php-jokesite 2.0 allows remote attackers to execute arbitrary sql commands via the cat_id parameter.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-05-27\n- Last Modified Date: 2017-09-29" } ] }, { "Unnamed: 0": "CVE-2012-0994", "mod_date": "2017-08-29", "pub_date": "2012-02-21", "cvss": 6.0, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the manage albums feature in zp-core/admin-albumsort.php in zenphoto 1.4.2 allows remote authenticated users to execute arbitrary sql commands via the sortablelist parameter.", "access_authentication": "SINGLE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.0\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the manage albums feature in zp-core/admin-albumsort.php in zenphoto 1.4.2 allows remote authenticated users to execute arbitrary sql commands via the sortablelist parameter.\n- Access Authentication: SINGLE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2012-02-21\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2017-11161", "mod_date": "2019-10-09", "pub_date": "2017-09-08", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in synology photo station before 6.7.4-3433 and 6.3-2968 allow remote attackers to execute arbitrary sql commands via the (1) article_id parameter to label.php; or (2) type parameter to synotheme.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in synology photo station before 6.7.4-3433 and 6.3-2968 allow remote attackers to execute arbitrary sql commands via the (1) article_id parameter to label.php; or (2) type parameter to synotheme.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2017-09-08\n- Last Modified Date: 2019-10-09" } ] }, { "Unnamed: 0": "CVE-2010-2577", "mod_date": "2010-08-16", "pub_date": "2010-08-16", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in pligg before 1.1.1 allow remote attackers to execute arbitrary sql commands via the title parameter to (1) storyrss.php or (2) story.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in pligg before 1.1.1 allow remote attackers to execute arbitrary sql commands via the title parameter to (1) storyrss.php or (2) story.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-08-16\n- Last Modified Date: 2010-08-16" } ] }, { "Unnamed: 0": "CVE-2005-4500", "mod_date": "2017-07-20", "pub_date": "2005-12-22", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in musicbox 2.3 allows remote attackers to execute arbitrary sql commands via the (1) show and (2) type parameter. note: the provenance of this information is unknown, although it was later rediscovered.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in musicbox 2.3 allows remote attackers to execute arbitrary sql commands via the (1) show and (2) type parameter. note: the provenance of this information is unknown, although it was later rediscovered.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2005-12-22\n- Last Modified Date: 2017-07-20" } ] }, { "Unnamed: 0": "CVE-2009-3255", "mod_date": "2017-08-17", "pub_date": "2009-09-18", "cvss": 6.8, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in rash quote management system (rqms) 1.2.2 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the user parameter in an admin action to the default uri.", "access_authentication": "NONE", "access_complexity": "MEDIUM", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.8\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in rash quote management system (rqms) 1.2.2 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the user parameter in an admin action to the default uri.\n- Access Authentication: NONE\n- Access Complexity: MEDIUM\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-09-18\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2008-3374", "mod_date": "2018-10-11", "pub_date": "2008-07-30", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ajax.php in gregarius 0.5.4 and earlier allows remote attackers to execute arbitrary sql commands via the rsargs array parameter in an __exp__getfeedcontent action.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ajax.php in gregarius 0.5.4 and earlier allows remote attackers to execute arbitrary sql commands via the rsargs array parameter in an __exp__getfeedcontent action.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2008-07-30\n- Last Modified Date: 2018-10-11" } ] }, { "Unnamed: 0": "CVE-2019-17418", "mod_date": "2019-10-10", "pub_date": "2019-10-10", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "an issue was discovered in metinfo 7.0. there is sql injection via the admin/?n=language&c=language_general&a=dosearchparameter appno parameter, a different issue than cve-2019-16997.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: an issue was discovered in metinfo 7.0. there is sql injection via the admin/?n=language&c=language_general&a=dosearchparameter appno parameter, a different issue than cve-2019-16997.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-10-10\n- Last Modified Date: 2019-10-10" } ] }, { "Unnamed: 0": "CVE-2010-0459", "mod_date": "2017-08-17", "pub_date": "2010-01-28", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in the mochigames (com_mochigames) component 0.51 and possibly other versions for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter to index.php.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in the mochigames (com_mochigames) component 0.51 and possibly other versions for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter to index.php.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2010-01-28\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2019-0984", "mod_date": "2019-06-13", "pub_date": "2019-06-12", "cvss": 7.2, "cwe_code": 264, "cwe_name": " Permissions Privileges and Access Controls", "summary": "an elevation of privilege vulnerability exists when the windows common log file system (clfs) driver improperly handles objects in memory, aka 'windows common log file system driver elevation of privilege vulnerability'. this cve id is unique from cve-2019-0959.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "LOCAL", "impact_availability": "COMPLETE", "impact_confidentiality": "COMPLETE", "impact_integrity": "COMPLETE", "vulnerability_type": "privilege_escalation", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Permissions Privileges and Access Controls." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 264:\n\n- Vulnerability Type: privilege_escalation\n- CVSS Score: 7.2\n- CWE Name: Permissions Privileges and Access Controls\n- Summary: an elevation of privilege vulnerability exists when the windows common log file system (clfs) driver improperly handles objects in memory, aka 'windows common log file system driver elevation of privilege vulnerability'. this cve id is unique from cve-2019-0959.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: LOCAL\n- Impact (Confidentiality, Integrity, Availability): COMPLETE/COMPLETE/COMPLETE\n- Published Date: 2019-06-12\n- Last Modified Date: 2019-06-13" } ] }, { "Unnamed: 0": "CVE-2008-6692", "mod_date": "2017-08-17", "pub_date": "2009-04-10", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in diocese of portsmouth training courses (pd_trainingcourses) extension 0.1.1 for typo3 allows remote attackers to execute arbitrary sql commands via unknown vectors.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in diocese of portsmouth training courses (pd_trainingcourses) extension 0.1.1 for typo3 allows remote attackers to execute arbitrary sql commands via unknown vectors.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2009-04-10\n- Last Modified Date: 2017-08-17" } ] }, { "Unnamed: 0": "CVE-2007-5104", "mod_date": "2017-07-29", "pub_date": "2007-09-26", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in index.php in the arcade module in bcoos 1.0.10 allows remote attackers to execute arbitrary sql commands via the gid parameter in a play_game action. note: the provenance of this information is unknown; the details are obtained solely from third party information.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in index.php in the arcade module in bcoos 1.0.10 allows remote attackers to execute arbitrary sql commands via the gid parameter in a play_game action. note: the provenance of this information is unknown; the details are obtained solely from third party information.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2007-09-26\n- Last Modified Date: 2017-07-29" } ] }, { "Unnamed: 0": "CVE-2019-8393", "mod_date": "2019-02-20", "pub_date": "2019-02-17", "cvss": 7.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "hotels_server through 2018-11-05 has sql injection via the api because the controller/api/login.php telephone parameter is mishandled.", "access_authentication": "NONE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 7.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: hotels_server through 2018-11-05 has sql injection via the api because the controller/api/login.php telephone parameter is mishandled.\n- Access Authentication: NONE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2019-02-17\n- Last Modified Date: 2019-02-20" } ] }, { "Unnamed: 0": "CVE-2013-0451", "mod_date": "2017-08-29", "pub_date": "2013-10-01", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "sql injection vulnerability in ibm maximo asset management 6.2 through 6.2.8 and 7.1 through 7.1.1.12 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: sql injection vulnerability in ibm maximo asset management 6.2 through 6.2.8 and 7.1 through 7.1.1.12 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2013-10-01\n- Last Modified Date: 2017-08-29" } ] }, { "Unnamed: 0": "CVE-2015-2292", "mod_date": "2016-12-03", "pub_date": "2015-03-17", "cvss": 6.5, "cwe_code": 89, "cwe_name": " Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "summary": "multiple sql injection vulnerabilities in admin/class-bulk-editor-list-table.php in the wordpress seo by yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for wordpress allow remote authenticated users to execute arbitrary sql commands via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page to wp-admin/admin.php. note: this can be leveraged using csrf to allow remote attackers to execute arbitrary sql commands.", "access_authentication": "SINGLE", "access_complexity": "LOW", "access_vector": "NETWORK", "impact_availability": "PARTIAL", "impact_confidentiality": "PARTIAL", "impact_integrity": "PARTIAL", "vulnerability_type": "sql_injection", "conversations": [ { "from": "human", "value": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')." }, { "from": "gpt", "value": "Sure! Here are the details for CWE Code: 89:\n\n- Vulnerability Type: sql_injection\n- CVSS Score: 6.5\n- CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n- Summary: multiple sql injection vulnerabilities in admin/class-bulk-editor-list-table.php in the wordpress seo by yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for wordpress allow remote authenticated users to execute arbitrary sql commands via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page to wp-admin/admin.php. note: this can be leveraged using csrf to allow remote attackers to execute arbitrary sql commands.\n- Access Authentication: SINGLE\n- Access Complexity: LOW\n- Access Vector: NETWORK\n- Impact (Confidentiality, Integrity, Availability): PARTIAL/PARTIAL/PARTIAL\n- Published Date: 2015-03-17\n- Last Modified Date: 2016-12-03" } ] } ] }