text
stringlengths 365
3.97k
| conversations
listlengths 3
3
|
---|---|
CWE Code: 862
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Missing Authorization
Summary: juju before 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3 uses a unix domain socket without setting appropriate permissions, allowing privilege escalation by users on the system to root.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-05-28
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Missing Authorization.",
"role": "user"
},
{
"content": "CWE Code: 862\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Missing Authorization\nSummary: juju before 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3 uses a unix domain socket without setting appropriate permissions, allowing privilege escalation by users on the system to root.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-05-28\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: the serial peripheral interface driver in android before 2016-07-05 on nexus 5x and 6p devices allows attackers to gain privileges via a crafted application, aka internal bug 28402196.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-07-11
Last Modified Date: 2016-07-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: the serial peripheral interface driver in android before 2016-07-05 on nexus 5x and 6p devices allows attackers to gain privileges via a crafted application, aka internal bug 28402196.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-11\nLast Modified Date: 2016-07-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: ibm contract management 10.1.0 through 10.1.3 and ibm emptoris spend analysis 10.1.0 through 10.1.3 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 164067.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-08-20
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: ibm contract management 10.1.0 through 10.1.3 and ibm emptoris spend analysis 10.1.0 through 10.1.3 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 164067.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-20\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 367
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Time-of-check Time-of-use (TOCTOU) Race Condition
Summary: an elevation of privilege vulnerability exists when windows improperly handles calls to advanced local procedure call (alpc), aka "windows alpc elevation of privilege vulnerability." this affects windows server 2016, windows 10, windows server 2019, windows 10 servers.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-11-14
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Time-of-check Time-of-use (TOCTOU) Race Condition.",
"role": "user"
},
{
"content": "CWE Code: 367\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Time-of-check Time-of-use (TOCTOU) Race Condition\nSummary: an elevation of privilege vulnerability exists when windows improperly handles calls to advanced local procedure call (alpc), aka \"windows alpc elevation of privilege vulnerability.\" this affects windows server 2016, windows 10, windows server 2019, windows 10 servers.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-11-14\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Out-of-bounds Write
Summary: in cameradeviceclient::submitrequestlist of cameradeviceclient.cpp, there is an out-of-bounds write if metadatasize is too small. this could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. android id: a-67782345.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-01-12
Last Modified Date: 2018-01-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Out-of-bounds Write\nSummary: in cameradeviceclient::submitrequestlist of cameradeviceclient.cpp, there is an out-of-bounds write if metadatasize is too small. this could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. android id: a-67782345.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-01-12\nLast Modified Date: 2018-01-30",
"role": "assistant"
}
] |
CWE Code: 129
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Validation of Array Index
Summary: nvidia windows gpu display driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) create context command ddi dxgkddicreatecontext in which the product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array, which may lead to denial of service or escalation of privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-02-27
Last Modified Date: 2019-05-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Validation of Array Index.",
"role": "user"
},
{
"content": "CWE Code: 129\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Validation of Array Index\nSummary: nvidia windows gpu display driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) create context command ddi dxgkddicreatecontext in which the product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array, which may lead to denial of service or escalation of privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-02-27\nLast Modified Date: 2019-05-09",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Permissions Privileges and Access Controls
Summary: drivers/video/msm/mdss/mdss_mdp_util.c in the qualcomm components in android before 2016-08-05 on nexus 5 devices does not verify that a mapping exists before proceeding with an unmap operation, which allows attackers to gain privileges via a crafted application, aka android internal bug 28815158 and qualcomm internal bugs cr794217 and cr836226.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-08-06
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: drivers/video/msm/mdss/mdss_mdp_util.c in the qualcomm components in android before 2016-08-05 on nexus 5 devices does not verify that a mapping exists before proceeding with an unmap operation, which allows attackers to gain privileges via a crafted application, aka android internal bug 28815158 and qualcomm internal bugs cr794217 and cr836226.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-08-06\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in developiteasy events calendar 1.2 allow remote attackers to execute arbitrary sql commands via (1) the user_name parameter (aka user field) to admin/index.php, (2) the user_pass parameter (aka pass field) to admin/index.php, or (3) the id parameter to calendar_details.php. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-04-06
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in developiteasy events calendar 1.2 allow remote attackers to execute arbitrary sql commands via (1) the user_name parameter (aka user field) to admin/index.php, (2) the user_pass parameter (aka pass field) to admin/index.php, or (3) the id parameter to calendar_details.php. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-04-06\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.4
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: buffer overflow in the virtio subsystem in qemu-kvm 0.14.0 and earlier allows privileged guest users to cause a denial of service (guest crash) or gain privileges via a crafted indirect descriptor related to "virtqueue in and out requests."
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2012-06-21
Last Modified Date: 2016-12-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.4\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in the virtio subsystem in qemu-kvm 0.14.0 and earlier allows privileged guest users to cause a denial of service (guest crash) or gain privileges via a crafted indirect descriptor related to \"virtqueue in and out requests.\"\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-06-21\nLast Modified Date: 2016-12-08",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.8
CWE Name: Improper Input Validation
Summary: in processmessagepart of inboundsmshandler.java, there is a possible remote denial of service due to improper input validation. this could lead to remote denial of service with no additional execution privileges needed. user interaction is not needed for exploitation. product: android versions: android-6.0 android-6.0.1 android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android id: a-72298611.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2018-11-06
Last Modified Date: 2018-12-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.8\nCWE Name: Improper Input Validation\nSummary: in processmessagepart of inboundsmshandler.java, there is a possible remote denial of service due to improper input validation. this could lead to remote denial of service with no additional execution privileges needed. user interaction is not needed for exploitation. product: android versions: android-6.0 android-6.0.1 android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android id: a-72298611.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2018-11-06\nLast Modified Date: 2018-12-12",
"role": "assistant"
}
] |
CWE Code: 416
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Use After Free
Summary: race condition in net/packet/af_packet.c in the linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the cap_net_raw capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-12-08
Last Modified Date: 2018-05-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Use After Free.",
"role": "user"
},
{
"content": "CWE Code: 416\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Use After Free\nSummary: race condition in net/packet/af_packet.c in the linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the cap_net_raw capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-12-08\nLast Modified Date: 2018-05-25",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in register.php in genixcms before 1.0.0 allows remote attackers to execute arbitrary sql commands via the activation parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-01-01
Last Modified Date: 2017-04-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in register.php in genixcms before 1.0.0 allows remote attackers to execute arbitrary sql commands via the activation parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-01-01\nLast Modified Date: 2017-04-11",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: microsoft internet explorer 9 through 11 allows remote attackers to bypass the same origin policy via unspecified vectors, aka "internet explorer elevation of privilege vulnerability," a different vulnerability than cve-2016-0069.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-02-18
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: microsoft internet explorer 9 through 11 allows remote attackers to bypass the same origin policy via unspecified vectors, aka \"internet explorer elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0069.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-02-18\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 862
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Missing Authorization
Summary: sap enterprise financial services, versions 6.05, 6.06, 6.16, 6.17, 6.18, 8.0 (in business function eafs_bca_busopr_2) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-09-11
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Missing Authorization.",
"role": "user"
},
{
"content": "CWE Code: 862\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Missing Authorization\nSummary: sap enterprise financial services, versions 6.05, 6.06, 6.16, 6.17, 6.18, 8.0 (in business function eafs_bca_busopr_2) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-09-11\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 16
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Configuration
Summary: the configuration merger in itk.c in the steinar h. gunderson mpm-itk multi-processing module 2.2.11-01 and 2.2.11-02 for the apache http server does not properly handle certain configuration sections that specify nicevalue but not assignuserid, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2011-03-29
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Configuration.",
"role": "user"
},
{
"content": "CWE Code: 16\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Configuration\nSummary: the configuration merger in itk.c in the steinar h. gunderson mpm-itk multi-processing module 2.2.11-01 and 2.2.11-02 for the apache http server does not properly handle certain configuration sections that specify nicevalue but not assignuserid, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2011-03-29\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 254
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: 7PK - Security Features
Summary: netapp clustered data ontap allows man-in-the-middle attackers to obtain sensitive information, gain privileges, or cause a denial of service by leveraging failure to enable smb signing enforcement in its default state.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-07-03
Last Modified Date: 2017-07-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: 7PK - Security Features.",
"role": "user"
},
{
"content": "CWE Code: 254\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: 7PK - Security Features\nSummary: netapp clustered data ontap allows man-in-the-middle attackers to obtain sensitive information, gain privileges, or cause a denial of service by leveraging failure to enable smb signing enforcement in its default state.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-07-03\nLast Modified Date: 2017-07-05",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the mailhandler module 5.x before 5.x-1.4 and 6.x before 6.x-1.4, a module for drupal, allows remote attackers to execute arbitrary sql commands via unspecified vectors, related to composing queries without using the drupal database api.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-09-24
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the mailhandler module 5.x before 5.x-1.4 and 6.x before 6.x-1.4, a module for drupal, allows remote attackers to execute arbitrary sql commands via unspecified vectors, related to composing queries without using the drupal database api.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-09-24\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in viewfaqs.php in scripts for sites (sfs) ez auction allows remote attackers to execute arbitrary sql commands via the cat parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-05-01
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in viewfaqs.php in scripts for sites (sfs) ez auction allows remote attackers to execute arbitrary sql commands via the cat parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-05-01\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: ioacceleratorfamily in apple os x before 10.11.2 and tvos before 9.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-12-11
Last Modified Date: 2017-09-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: ioacceleratorfamily in apple os x before 10.11.2 and tvos before 9.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-12-11\nLast Modified Date: 2017-09-13",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Permissions Privileges and Access Controls
Summary: the server in collabnet scrumworks pro before 6.0 allows remote authenticated users to gain privileges and obtain sensitive information via a modified desktop client.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-06-08
Last Modified Date: 2012-06-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: the server in collabnet scrumworks pro before 6.0 allows remote authenticated users to gain privileges and obtain sensitive information via a modified desktop client.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-06-08\nLast Modified Date: 2012-06-28",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: heap-based buffer overflow in drivers/media/platform/msm/camera_v2/sensor/actuator/msm_actuator.c in the qualcomm components in android before 2016-07-05 on nexus 5 and 7 (2013) devices allows attackers to gain privileges via a crafted application, aka android internal bug 28557260 and qualcomm internal bug cr545979.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-07-11
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: heap-based buffer overflow in drivers/media/platform/msm/camera_v2/sensor/actuator/msm_actuator.c in the qualcomm components in android before 2016-07-05 on nexus 5 and 7 (2013) devices allows attackers to gain privileges via a crafted application, aka android internal bug 28557260 and qualcomm internal bug cr545979.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-11\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the sentinel plugin 1.0.0 for wordpress allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-10-25
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the sentinel plugin 1.0.0 for wordpress allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-10-25\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in kalptaru infotech php site lock 2.0 allows remote attackers to execute arbitrary sql commands via the articleid parameter in a show_article action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-06-25
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in kalptaru infotech php site lock 2.0 allows remote attackers to execute arbitrary sql commands via the articleid parameter in a show_article action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-25\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: microsoft windows vista sp2; windows server 2008 sp2 and r2; windows 7 sp1; windows 8.1, windows server 2012 gold and r2, windows rt 8.1; windows 10 gold, 1511, and 1607; and windows server 2016 let attackers with access to targets systems gain privileges when windows fails to properly validate buffer lengths, aka "windows elevation of privilege vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-03-17
Last Modified Date: 2017-07-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: microsoft windows vista sp2; windows server 2008 sp2 and r2; windows 7 sp1; windows 8.1, windows server 2012 gold and r2, windows rt 8.1; windows 10 gold, 1511, and 1607; and windows server 2016 let attackers with access to targets systems gain privileges when windows fails to properly validate buffer lengths, aka \"windows elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-03-17\nLast Modified Date: 2017-07-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the "content types > content types" screen in dotcms before 3.3.1 allows remote authenticated attackers to execute arbitrary sql commands via the orderby parameter.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-11-14
Last Modified Date: 2016-11-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the \"content types > content types\" screen in dotcms before 3.3.1 allows remote authenticated attackers to execute arbitrary sql commands via the orderby parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-11-14\nLast Modified Date: 2016-11-29",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: cisco web security appliance (wsa) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle python module during certain tunnel-status checks, which allows local users to execute arbitrary python code and gain privileges via a crafted pickle file, aka bug id cscut39259.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-04-15
Last Modified Date: 2017-01-06 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: cisco web security appliance (wsa) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle python module during certain tunnel-status checks, which allows local users to execute arbitrary python code and gain privileges via a crafted pickle file, aka bug id cscut39259.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-04-15\nLast Modified Date: 2017-01-06",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: dolibarr erp/crm 9.0.1 was affected by stored xss within uploaded files. these vulnerabilities allowed the execution of a javascript payload each time any regular user or administrative user clicked on the malicious link hosted on the same domain. the vulnerabilities could be exploited by low privileged users to target administrators. the viewimage.php page did not perform any contextual output encoding and would display the content within the uploaded file with a user-requested mime type.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2019-07-29
Last Modified Date: 2019-08-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: dolibarr erp/crm 9.0.1 was affected by stored xss within uploaded files. these vulnerabilities allowed the execution of a javascript payload each time any regular user or administrative user clicked on the malicious link hosted on the same domain. the vulnerabilities could be exploited by low privileged users to target administrators. the viewimage.php page did not perform any contextual output encoding and would display the content within the uploaded file with a user-requested mime type.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-07-29\nLast Modified Date: 2019-08-05",
"role": "assistant"
}
] |
CWE Code: 74
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Summary: opentext documentum content server (formerly emc documentum content server) 7.3, when postgresql database is used and return_top_results_row_based config option is false, does not properly restrict dql hints, which allows remote authenticated users to conduct dql injection attacks and execute arbitrary dml or ddl commands via a crafted request. note: this vulnerability exists because of an incomplete fix for cve-2014-2520.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-02-22
Last Modified Date: 2017-03-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection').",
"role": "user"
},
{
"content": "CWE Code: 74\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')\nSummary: opentext documentum content server (formerly emc documentum content server) 7.3, when postgresql database is used and return_top_results_row_based config option is false, does not properly restrict dql hints, which allows remote authenticated users to conduct dql injection attacks and execute arbitrary dml or ddl commands via a crafted request. note: this vulnerability exists because of an incomplete fix for cve-2014-2520.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-02-22\nLast Modified Date: 2017-03-02",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Input Validation
Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 8.0.16 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-07-23
Last Modified Date: 2019-08-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Input Validation\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 8.0.16 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-07-23\nLast Modified Date: 2019-08-14",
"role": "assistant"
}
] |
CWE Code: 416
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Use After Free
Summary: the xfrm dump policy implementation in net/xfrm/xfrm_user.c in the linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted so_rcvbuf setsockopt system call in conjunction with xfrm_msg_getpolicy netlink messages.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-11-24
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Use After Free.",
"role": "user"
},
{
"content": "CWE Code: 416\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Use After Free\nSummary: the xfrm dump policy implementation in net/xfrm/xfrm_user.c in the linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted so_rcvbuf setsockopt system call in conjunction with xfrm_msg_getpolicy netlink messages.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-11-24\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 824
Vulnerability Type: privilege_escalation
CVSS Score: 6.0
CWE Name: Access of Uninitialized Pointer
Summary: an access of uninitialized pointer vulnerability in cx-supervisor (versions 3.42 and prior) could lead to type confusion when processing project files. an attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-02-12
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Access of Uninitialized Pointer.",
"role": "user"
},
{
"content": "CWE Code: 824\nVulnerability Type: privilege_escalation\nCVSS Score: 6.0\nCWE Name: Access of Uninitialized Pointer\nSummary: an access of uninitialized pointer vulnerability in cx-supervisor (versions 3.42 and prior) could lead to type confusion when processing project files. an attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-02-12\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in apprain cmf 3.0.2 and earlier allows remote attackers to execute arbitrary sql commands via the path_info to blog-by-cat/.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2013-11-14
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in apprain cmf 3.0.2 and earlier allows remote attackers to execute arbitrary sql commands via the path_info to blog-by-cat/.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-11-14\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-05-27
Last Modified Date: 2016-12-31 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-05-27\nLast Modified Date: 2016-12-31",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in tr.php in yourfreeworld ad-exchange script allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-08-21
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in tr.php in yourfreeworld ad-exchange script allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-21\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Input Validation
Summary: an issue was discovered in certain apple products. macos before 10.13.2 is affected. the issue involves the "iokit" component. it allows attackers to execute arbitrary code in a privileged context via a crafted app.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-12-25
Last Modified Date: 2017-12-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Input Validation\nSummary: an issue was discovered in certain apple products. macos before 10.13.2 is affected. the issue involves the \"iokit\" component. it allows attackers to execute arbitrary code in a privileged context via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-12-25\nLast Modified Date: 2017-12-28",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: the kmxfw.sys driver in ca host-based intrusion prevention system (hips) r8, as used in ca internet security suite and personal firewall, does not properly verify ioctl requests, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted request.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2008-08-12
Last Modified Date: 2018-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: the kmxfw.sys driver in ca host-based intrusion prevention system (hips) r8, as used in ca internet security suite and personal firewall, does not properly verify ioctl requests, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2008-08-12\nLast Modified Date: 2018-10-11",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: qemu, as used in xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local os guest users to gain privileges via a crafted escape vt100 sequence that triggers the overwrite of a "device model's address space."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2012-11-23
Last Modified Date: 2017-07-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: qemu, as used in xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local os guest users to gain privileges via a crafted escape vt100 sequence that triggers the overwrite of a \"device model's address space.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-11-23\nLast Modified Date: 2017-07-01",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: lib\modules\contributors\contributor_list_table.php in the podlove podcast publisher plugin 2.5.3 and earlier for wordpress has sql injection in the orderby parameter to wp-admin/admin.php, exploitable through csrf.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-08-18
Last Modified Date: 2017-08-24 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: lib\\modules\\contributors\\contributor_list_table.php in the podlove podcast publisher plugin 2.5.3 and earlier for wordpress has sql injection in the orderby parameter to wp-admin/admin.php, exploitable through csrf.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-08-18\nLast Modified Date: 2017-08-24",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to perform a command-injection attack on an affected device. the vulnerability is due to insufficient input validation of command arguments. an attacker could exploit this vulnerability by injecting malicious command arguments into a vulnerable cli command. a successful exploit could allow the attacker, authenticated as a privileged user, to execute arbitrary commands with root privileges. note: on products that support multiple virtual device contexts (vdc), this vulnerability could allow an attacker to access files from any vdc. this vulnerability affects nexus 2000 series fabric extenders, nexus 3000 series switches, nexus 3500 platform switches, nexus 3600 platform switches, nexus 5500 platform switches, nexus 5600 platform switches, nexus 6000 series switches, nexus 7000 series switches, nexus 7700 series switches, nexus 9000 series switches in standalone nx-os mode, nexus 9500 r-series line cards and fabric modules. cisco bug ids: cscve51704, cscve91749, cscve91768.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-06-20
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to perform a command-injection attack on an affected device. the vulnerability is due to insufficient input validation of command arguments. an attacker could exploit this vulnerability by injecting malicious command arguments into a vulnerable cli command. a successful exploit could allow the attacker, authenticated as a privileged user, to execute arbitrary commands with root privileges. note: on products that support multiple virtual device contexts (vdc), this vulnerability could allow an attacker to access files from any vdc. this vulnerability affects nexus 2000 series fabric extenders, nexus 3000 series switches, nexus 3500 platform switches, nexus 3600 platform switches, nexus 5500 platform switches, nexus 5600 platform switches, nexus 6000 series switches, nexus 7000 series switches, nexus 7700 series switches, nexus 9000 series switches in standalone nx-os mode, nexus 9500 r-series line cards and fabric modules. cisco bug ids: cscve51704, cscve91749, cscve91768.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-06-20\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in news_read.php in pilot group (pg) etraining allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-23
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in news_read.php in pilot group (pg) etraining allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-23\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in contact.php in mrcgiguy (mcg) freeticket 1.0.0, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) id and (2) email parameters in a showtickets action.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-12-01
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in contact.php in mrcgiguy (mcg) freeticket 1.0.0, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) id and (2) email parameters in a showtickets action.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-12-01\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in lasernet cms 1.5 and 1.11, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the new parameter in a new action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-04-22
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in lasernet cms 1.5 and 1.11, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the new parameter in a new action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-04-22\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 287
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Improper Authentication
Summary: the auth0 authentication service before 2017-10-15 allows privilege escalation because the jwt audience is not validated.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-04-04
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Authentication.",
"role": "user"
},
{
"content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Improper Authentication\nSummary: the auth0 authentication service before 2017-10-15 allows privilege escalation because the jwt audience is not validated.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-04-04\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Out-of-bounds Read
Summary: in ieee802_11_rx_wnmsleep_req of wnm_ap.c in android-7.0, android-7.1.1, android-7.1.2, android-8.0, android-8.1 and android-9, there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure in the wifi driver with no additional execution privileges needed. user interaction is not needed for exploitation. android id: a-111893132.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-02-11
Last Modified Date: 2019-02-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Out-of-bounds Read\nSummary: in ieee802_11_rx_wnmsleep_req of wnm_ap.c in android-7.0, android-7.1.1, android-7.1.2, android-8.0, android-8.1 and android-9, there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure in the wifi driver with no additional execution privileges needed. user interaction is not needed for exploitation. android id: a-111893132.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-02-11\nLast Modified Date: 2019-02-12",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: bigtree-cms contains a cross site scripting (xss) vulnerability in /users/create that can result in the low-privileged users can use this vulnerability to attack high-privileged(developer) users.. this attack appear to be exploitable via no. this vulnerability appears to have been fixed in after commit b652cfdc14d0670c81ac4401ad5a04376745c279.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2018-06-26
Last Modified Date: 2018-08-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: bigtree-cms contains a cross site scripting (xss) vulnerability in /users/create that can result in the low-privileged users can use this vulnerability to attack high-privileged(developer) users.. this attack appear to be exploitable via no. this vulnerability appears to have been fixed in after commit b652cfdc14d0670c81ac4401ad5a04376745c279.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2018-06-26\nLast Modified Date: 2018-08-27",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Permissions Privileges and Access Controls
Summary: the datastor kernel module in f5 big-ip analytics, apm, asm, link controller, and ltm 11.1.0 before 12.0.0, big-ip aam 11.4.0 before 12.0.0, big-ip afm, pem 11.3.0 before 12.0.0, big-ip edge gateway, webaccelerator, and wom 11.1.0 through 11.3.0, big-ip gtm 11.1.0 through 11.6.0, big-ip psm 11.1.0 through 11.4.1, big-iq cloud and security 4.0.0 through 4.5.0, big-iq device 4.2.0 through 4.5.0, big-iq adc 4.5.0, and enterprise manager 3.0.0 through 3.1.1 allows remote authenticated users to cause a denial of service or gain privileges by leveraging permission to upload and execute code.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-11-06
Last Modified Date: 2019-06-06 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: the datastor kernel module in f5 big-ip analytics, apm, asm, link controller, and ltm 11.1.0 before 12.0.0, big-ip aam 11.4.0 before 12.0.0, big-ip afm, pem 11.3.0 before 12.0.0, big-ip edge gateway, webaccelerator, and wom 11.1.0 through 11.3.0, big-ip gtm 11.1.0 through 11.6.0, big-ip psm 11.1.0 through 11.4.1, big-iq cloud and security 4.0.0 through 4.5.0, big-iq device 4.2.0 through 4.5.0, big-iq adc 4.5.0, and enterprise manager 3.0.0 through 3.1.1 allows remote authenticated users to cause a denial of service or gain privileges by leveraging permission to upload and execute code.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-11-06\nLast Modified Date: 2019-06-06",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Out-of-bounds Write
Summary: in impd_init_drc_decode_post_config of impd_drc_gain_decoder.c there is a possible out-of-bound write due to incorrect bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-9. android id: a-113885537.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-12-07
Last Modified Date: 2019-01-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Out-of-bounds Write\nSummary: in impd_init_drc_decode_post_config of impd_drc_gain_decoder.c there is a possible out-of-bound write due to incorrect bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-9. android id: a-113885537.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-12-07\nLast Modified Date: 2019-01-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the redshop component (com_redshop) 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the pid parameter to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-07-12
Last Modified Date: 2010-07-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the redshop component (com_redshop) 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the pid parameter to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-07-12\nLast Modified Date: 2010-07-13",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: opielogin.c in opielogin in opie 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2011-07-27
Last Modified Date: 2011-09-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: opielogin.c in opielogin in opie 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2011-07-27\nLast Modified Date: 2011-09-07",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in xlportal 2.2.4 and earlier allows remote attackers to execute arbitrary sql commands via the query parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-03-25
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in xlportal 2.2.4 and earlier allows remote attackers to execute arbitrary sql commands via the query parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-03-25\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: serverscheck monitoring software before 14.3.4 allows sql injection by an authenticated user.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-10-21
Last Modified Date: 2018-12-04 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: serverscheck monitoring software before 14.3.4 allows sql injection by an authenticated user.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-10-21\nLast Modified Date: 2018-12-04",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Out-of-bounds Write
Summary: in rw_t3t_act_handle_check_ndef_rsp of rw_t3t.cc, there is a possible out-of-bound write due to a missing bounds check. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9. android id: a-120502559.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-04-19
Last Modified Date: 2019-04-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Out-of-bounds Write\nSummary: in rw_t3t_act_handle_check_ndef_rsp of rw_t3t.cc, there is a possible out-of-bound write due to a missing bounds check. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9. android id: a-120502559.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-04-19\nLast Modified Date: 2019-04-22",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection exists in the alexandria book library 3.1.2 component for joomla! via the letter parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-02-22
Last Modified Date: 2018-03-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in the alexandria book library 3.1.2 component for joomla! via the letter parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-02-22\nLast Modified Date: 2018-03-02",
"role": "assistant"
}
] |
CWE Code: 190
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Integer Overflow or Wraparound
Summary: an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: kernel-3.18. android id: a-33177895. references: n-cve-2017-0307.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-03-08
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.",
"role": "user"
},
{
"content": "CWE Code: 190\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Integer Overflow or Wraparound\nSummary: an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: kernel-3.18. android id: a-33177895. references: n-cve-2017-0307.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-03-08\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 521
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Weak Password Requirements
Summary: ansible tower before version 3.2.4 has a flaw in the management of system and organization administrators that allows for privilege escalation. system administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-05-02
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Weak Password Requirements.",
"role": "user"
},
{
"content": "CWE Code: 521\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Weak Password Requirements\nSummary: ansible tower before version 3.2.4 has a flaw in the management of system and organization administrators that allows for privilege escalation. system administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-05-02\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: the xraywrapper implementation in mozilla firefox before 22.0, firefox esr 17.x before 17.0.7, thunderbird before 17.0.7, and thunderbird esr 17.x before 17.0.7 does not properly restrict use of defaultvalue for method calls, which allows remote attackers to execute arbitrary javascript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) tostring or (2) valueof method.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-06-26
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: the xraywrapper implementation in mozilla firefox before 22.0, firefox esr 17.x before 17.0.7, thunderbird before 17.0.7, and thunderbird esr 17.x before 17.0.7 does not properly restrict use of defaultvalue for method calls, which allows remote attackers to execute arbitrary javascript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) tostring or (2) valueof method.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-06-26\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 4.9
CWE Name: Improper Input Validation
Summary: denial of service in unified shader compiler in intel graphics drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user from a virtual machine guest to potentially crash the host system via local access.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2018-10-10
Last Modified Date: 2019-10-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Improper Input Validation\nSummary: denial of service in unified shader compiler in intel graphics drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user from a virtual machine guest to potentially crash the host system via local access.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2018-10-10\nLast Modified Date: 2019-10-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in plogger 3.0 and earlier allow remote attackers to execute arbitrary sql commands via (1) the checked array parameter to plog-download.php in an album action and (2) unspecified parameters to plog-remote.php, and (3) allow remote authenticated administrators to execute arbitrary sql commands via the activate parameter to admin/plog-themes.php, related to theme_dir settings.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-08-10
Last Modified Date: 2018-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in plogger 3.0 and earlier allow remote attackers to execute arbitrary sql commands via (1) the checked array parameter to plog-download.php in an album action and (2) unspecified parameters to plog-remote.php, and (3) allow remote authenticated administrators to execute arbitrary sql commands via the activate parameter to admin/plog-themes.php, related to theme_dir settings.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-10\nLast Modified Date: 2018-10-11",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection exists in easy car script 2014 via the s_order or s_row parameter to site_search.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-01-24
Last Modified Date: 2018-02-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in easy car script 2014 via the s_order or s_row parameter to site_search.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-01-24\nLast Modified Date: 2018-02-07",
"role": "assistant"
}
] |
CWE Code: 352
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Cross-Site Request Forgery (CSRF)
Summary: microsoft project server and microsoft sharepoint enterprise server 2016 allow an attacker to use cross-site forgery to read content that they are not authorized to read, use the victim's identity to take actions on the web application on behalf of the victim, such as change permissions and delete content, and inject malicious content in the browser of the victim, aka "microsoft project server elevation of privilege vulnerability".
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-11-15
Last Modified Date: 2017-11-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF).",
"role": "user"
},
{
"content": "CWE Code: 352\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Cross-Site Request Forgery (CSRF)\nSummary: microsoft project server and microsoft sharepoint enterprise server 2016 allow an attacker to use cross-site forgery to read content that they are not authorized to read, use the victim's identity to take actions on the web application on behalf of the victim, such as change permissions and delete content, and inject malicious content in the browser of the victim, aka \"microsoft project server elevation of privilege vulnerability\".\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-11-15\nLast Modified Date: 2017-11-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in asp-dev xm forums rc3 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) profile.asp, (2) forum.asp, or (3) topic.asp.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-07-25
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in asp-dev xm forums rc3 allow remote attackers to execute arbitrary sql commands via the id parameter to (1) profile.asp, (2) forum.asp, or (3) topic.asp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-07-25\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: otools in apple xcode before 7.2 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted mach-o file, a different vulnerability than cve-2015-7049.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-12-11
Last Modified Date: 2016-12-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: otools in apple xcode before 7.2 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted mach-o file, a different vulnerability than cve-2015-7049.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-12-11\nLast Modified Date: 2016-12-07",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an issue was discovered in certain apple products. ios before 10.3.2 is affected. tvos before 10.2.1 is affected. watchos before 3.2.2 is affected. the issue involves the "avevideoencoder" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-05-22
Last Modified Date: 2019-03-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 10.3.2 is affected. tvos before 10.2.1 is affected. watchos before 3.2.2 is affected. the issue involves the \"avevideoencoder\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-05-22\nLast Modified Date: 2019-03-08",
"role": "assistant"
}
] |
CWE Code: 664
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Control of a Resource Through its Lifetime
Summary: the trustzone driver in huawei p9 phones with software versions earlier than eva-al10c00b352 and p9 lite with software vns-l21c185b130 and earlier versions and p8 lite with software ale-l02c636b150 and earlier versions has an improper resource release vulnerability, which allows attackers to cause a system restart or privilege elevation.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-04-02
Last Modified Date: 2017-04-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Control of a Resource Through its Lifetime.",
"role": "user"
},
{
"content": "CWE Code: 664\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Control of a Resource Through its Lifetime\nSummary: the trustzone driver in huawei p9 phones with software versions earlier than eva-al10c00b352 and p9 lite with software vns-l21c185b130 and earlier versions and p8 lite with software ale-l02c636b150 and earlier versions has an improper resource release vulnerability, which allows attackers to cause a system restart or privilege elevation.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-04-02\nLast Modified Date: 2017-04-07",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in view.php in coronamatrix phpaddressbook 2.11 allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-04-16
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in view.php in coronamatrix phpaddressbook 2.11 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-04-16\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: the ptmx_get_ioctl function in the arm kernel in apple ios before 7.1 and apple tv before 6.1 allows local users to gain privileges or cause a denial of service (out-of-bounds memory access and device crash) via a crafted call.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-03-14
Last Modified Date: 2019-03-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the ptmx_get_ioctl function in the arm kernel in apple ios before 7.1 and apple tv before 6.1 allows local users to gain privileges or cause a denial of service (out-of-bounds memory access and device crash) via a crafted call.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-03-14\nLast Modified Date: 2019-03-08",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Permissions Privileges and Access Controls
Summary: ibm maximo asset management 6.2 through 6.2.8, 7.1 before 7.1.1.12, and 7.5 before 7.5.0.5 allows remote authenticated users to gain privileges via unspecified vectors, a different vulnerability than cve-2013-5382.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2013-10-01
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: ibm maximo asset management 6.2 through 6.2.8, 7.1 before 7.1.1.12, and 7.5 before 7.5.0.5 allows remote authenticated users to gain privileges via unspecified vectors, a different vulnerability than cve-2013-5382.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2013-10-01\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in 2daybiz multi level marketing (mlm) software allow remote attackers to execute arbitrary sql commands via the username parameter to (1) index.php and (2) admin/index.php. note: the provenance of this information is unknown; the details are obtained solely from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-06-29
Last Modified Date: 2010-06-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in 2daybiz multi level marketing (mlm) software allow remote attackers to execute arbitrary sql commands via the username parameter to (1) index.php and (2) admin/index.php. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-06-29\nLast Modified Date: 2010-06-30",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: in the clearkey cas descrambler, there is a possible use after free due to a race condition. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android-8.0 android-8.1 android-9. android id: a-113027383
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-11-14
Last Modified Date: 2018-12-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: in the clearkey cas descrambler, there is a possible use after free due to a race condition. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android-8.0 android-8.1 android-9. android id: a-113027383\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-11-14\nLast Modified Date: 2018-12-17",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Improper Input Validation
Summary: a vulnerability in the web-based gui of cisco integrated management controller (imc) 3.0(1c) could allow an authenticated, remote attacker to execute arbitrary code on an affected system. the vulnerability exists because the affected software does not sufficiently sanitize specific values that are received as part of a user-supplied http request. an attacker could exploit this vulnerability by sending a crafted http request to the affected software. a successful exploit could allow the attacker to execute arbitrary code with the privileges of the user on the affected system. cisco bug ids: cscvd14578.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-04-20
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Input Validation\nSummary: a vulnerability in the web-based gui of cisco integrated management controller (imc) 3.0(1c) could allow an authenticated, remote attacker to execute arbitrary code on an affected system. the vulnerability exists because the affected software does not sufficiently sanitize specific values that are received as part of a user-supplied http request. an attacker could exploit this vulnerability by sending a crafted http request to the affected software. a successful exploit could allow the attacker to execute arbitrary code with the privileges of the user on the affected system. cisco bug ids: cscvd14578.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-04-20\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 476
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: NULL Pointer Dereference
Summary: a keredirect untrusted pointer dereference privilege escalation vulnerability in trend micro antivirus for mac (consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. the issue results from the lack of proper validation function on 0x6f6a offset user-supplied buffer. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-10-23
Last Modified Date: 2018-12-04 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: NULL Pointer Dereference.",
"role": "user"
},
{
"content": "CWE Code: 476\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: NULL Pointer Dereference\nSummary: a keredirect untrusted pointer dereference privilege escalation vulnerability in trend micro antivirus for mac (consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. the issue results from the lack of proper validation function on 0x6f6a offset user-supplied buffer. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-10-23\nLast Modified Date: 2018-12-04",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.6
CWE Name: Permissions Privileges and Access Controls
Summary: the java debug wire protocol (jdwp) implementation in adb/sockets.cpp in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-09-01 mishandles socket close operations, which allows attackers to gain privileges via a crafted application, aka internal bug 28347842.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-09-11
Last Modified Date: 2017-08-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: the java debug wire protocol (jdwp) implementation in adb/sockets.cpp in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-09-01 mishandles socket close operations, which allows attackers to gain privileges via a crafted application, aka internal bug 28347842.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-09-11\nLast Modified Date: 2017-08-13",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in public/specific.php in ez-blog before beta 2 20090427, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the category parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-05-12
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in public/specific.php in ez-blog before beta 2 20090427, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the category parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-05-12\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 276
Vulnerability Type: privilege_escalation
CVSS Score: 4.4
CWE Name: Incorrect Default Permissions
Summary: nvidia geforce experience prior to 3.15 contains a vulnerability when gamestream is enabled which sets incorrect permissions on a file, which may to code execution, denial of service, or escalation of privileges by users with system access.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-10-02
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Default Permissions.",
"role": "user"
},
{
"content": "CWE Code: 276\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Incorrect Default Permissions\nSummary: nvidia geforce experience prior to 3.15 contains a vulnerability when gamestream is enabled which sets incorrect permissions on a file, which may to code execution, denial of service, or escalation of privileges by users with system access.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-10-02\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in arsiv.asp in xweblog 2.2 allows remote attackers to execute arbitrary sql commands via the tarih parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-10-05
Last Modified Date: 2012-05-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in arsiv.asp in xweblog 2.2 allows remote attackers to execute arbitrary sql commands via the tarih parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-10-05\nLast Modified Date: 2012-05-14",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Permissions Privileges and Access Controls
Summary: the debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the apache http server on debian gnu/linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2013-03-06
Last Modified Date: 2013-03-06 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: the debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the apache http server on debian gnu/linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-03-06\nLast Modified Date: 2013-03-06",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 2.6
CWE Name: Information Exposure
Summary: an information disclosure vulnerability in the camera driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31351206. references: n-cve-2016-8469.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2017-01-12
Last Modified Date: 2017-01-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.6\nCWE Name: Information Exposure\nSummary: an information disclosure vulnerability in the camera driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31351206. references: n-cve-2016-8469.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-01-18",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in the marketplace (com_marketplace) 1.1.1 and 1.1.1-pl1 component for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter in a show_category action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-02-12
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the marketplace (com_marketplace) 1.1.1 and 1.1.1-pl1 component for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter in a show_category action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-12\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in out.php in yabsoft advanced image hosting (aih) script 2.1 and earlier allows remote attackers to execute arbitrary sql commands via the t parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-06-03
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in out.php in yabsoft advanced image hosting (aih) script 2.1 and earlier allows remote attackers to execute arbitrary sql commands via the t parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-03\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 254
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: 7PK - Security Features
Summary: ibm security privileged identity manager 2.0 before 2.0.2 fp8, when virtual appliance is used, does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2016-11-24
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: 7PK - Security Features.",
"role": "user"
},
{
"content": "CWE Code: 254\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: 7PK - Security Features\nSummary: ibm security privileged identity manager 2.0 before 2.0.2 fp8, when virtual appliance is used, does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2016-11-24\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in result.php in customer paradigm pagedirector cms allows remote attackers to execute arbitrary sql commands via the sub_catid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-07-12
Last Modified Date: 2010-07-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in result.php in customer paradigm pagedirector cms allows remote attackers to execute arbitrary sql commands via the sub_catid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-07-12\nLast Modified Date: 2010-07-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.0
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in members.php in the members cv (job) module 1.0 for php-fusion, when magic_quotes_gpc is disabled, allows remote authenticated users to execute arbitrary sql commands via the sortby parameter.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-03-05
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in members.php in the members cv (job) module 1.0 for php-fusion, when magic_quotes_gpc is disabled, allows remote authenticated users to execute arbitrary sql commands via the sortby parameter.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-05\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in announcement.php in vbulletin 4.1.10 allows remote attackers to execute arbitrary sql commands via the announcementid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-08-28
Last Modified Date: 2012-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in announcement.php in vbulletin 4.1.10 allows remote attackers to execute arbitrary sql commands via the announcementid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-08-28\nLast Modified Date: 2012-08-29",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Access Control
Summary: vulnerability in the jd edwards enterpriseone tools component of oracle jd edwards products (subcomponent: web runtime). the supported version that is affected is 9.2. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise jd edwards enterpriseone tools. successful attacks of this vulnerability can result in unauthorized read access to a subset of jd edwards enterpriseone tools accessible data. cvss 3.0 base score 4.3 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:n).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-04-23
Last Modified Date: 2019-04-24 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Access Control\nSummary: vulnerability in the jd edwards enterpriseone tools component of oracle jd edwards products (subcomponent: web runtime). the supported version that is affected is 9.2. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise jd edwards enterpriseone tools. successful attacks of this vulnerability can result in unauthorized read access to a subset of jd edwards enterpriseone tools accessible data. cvss 3.0 base score 4.3 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-04-23\nLast Modified Date: 2019-04-24",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Out-of-bounds Write
Summary: in hevc codec, there is an out-of-bounds write due to an incorrect bounds check with the i2_pic_width_in_luma_samples value. this could lead to remote escalation of privilege with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. android id: a-65483665.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-02-12
Last Modified Date: 2018-03-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Out-of-bounds Write\nSummary: in hevc codec, there is an out-of-bounds write due to an incorrect bounds check with the i2_pic_width_in_luma_samples value. this could lead to remote escalation of privilege with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. android id: a-65483665.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-02-12\nLast Modified Date: 2018-03-13",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in asd.php in onecms 2.5 allows remote attackers to execute arbitrary sql commands via the sitename parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-04-07
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in asd.php in onecms 2.5 allows remote attackers to execute arbitrary sql commands via the sitename parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-04-07\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: the diskimages component in apple ios before 8.4.1 and os x before 10.10.5 allows local users to gain privileges or cause a denial of service (memory corruption and application crash) via a malformed dmg image.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-08-17
Last Modified Date: 2016-12-24 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the diskimages component in apple ios before 8.4.1 and os x before 10.10.5 allows local users to gain privileges or cause a denial of service (memory corruption and application crash) via a malformed dmg image.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-08-17\nLast Modified Date: 2016-12-24",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: drivers/media/platform/msm/camera_v2/isp/msm_isp_axi_util.c in the qualcomm components in android before 2016-08-05 on nexus 5 and 7 (2013) devices does not validate the number of streams, which allows attackers to gain privileges via a crafted application, aka android internal bug 28749629 and qualcomm internal bug cr514702.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-08-06
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: drivers/media/platform/msm/camera_v2/isp/msm_isp_axi_util.c in the qualcomm components in android before 2016-08-05 on nexus 5 and 7 (2013) devices does not validate the number of streams, which allows attackers to gain privileges via a crafted application, aka android internal bug 28749629 and qualcomm internal bug cr514702.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-08-06\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 22
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary: jfrog jfrog artifactory version prior to version 6.0.3, since version 4.0.0 contains a directory traversal vulnerability in the "import repository from zip" feature, available through the admin menu -> import & export -> repositories, triggers a vulnerable ui rest endpoint (/ui/artifactimport/upload) that can result in directory traversal / file overwrite and remote code execution. this attack appear to be exploitable via an attacker with admin privileges may use the aforementioned ui endpoint and exploit the publicly known "zip slip" vulnerability, to add/overwrite files outside the target directory. this vulnerability appears to have been fixed in 6.0.3.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-07-09
Last Modified Date: 2018-09-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal').",
"role": "user"
},
{
"content": "CWE Code: 22\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\nSummary: jfrog jfrog artifactory version prior to version 6.0.3, since version 4.0.0 contains a directory traversal vulnerability in the \"import repository from zip\" feature, available through the admin menu -> import & export -> repositories, triggers a vulnerable ui rest endpoint (/ui/artifactimport/upload) that can result in directory traversal / file overwrite and remote code execution. this attack appear to be exploitable via an attacker with admin privileges may use the aforementioned ui endpoint and exploit the publicly known \"zip slip\" vulnerability, to add/overwrite files outside the target directory. this vulnerability appears to have been fixed in 6.0.3.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-07-09\nLast Modified Date: 2018-09-11",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.6
CWE Name: Permissions Privileges and Access Controls
Summary: the mediatek connectivity kernel driver in android 6.0.1 before 2016-03-01 allows attackers to gain privileges via a crafted application that leverages conn_launcher access, aka internal bug 25873324.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-03-12
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: the mediatek connectivity kernel driver in android 6.0.1 before 2016-03-01 allows attackers to gain privileges via a crafted application that leverages conn_launcher access, aka internal bug 25873324.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-03-12\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in open.php in the private messaging (com_privmsg) component for limbo cms allows remote attackers to execute arbitrary sql commands via the id parameter in a pms action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-06
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in open.php in the private messaging (com_privmsg) component for limbo cms allows remote attackers to execute arbitrary sql commands via the id parameter in a pms action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-06\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: an issue is discovered in baijiacms v4. blind sql injection exists via the order parameter in an index.php?act=index request.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-09-08
Last Modified Date: 2018-10-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue is discovered in baijiacms v4. blind sql injection exists via the order parameter in an index.php?act=index request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-09-08\nLast Modified Date: 2018-10-26",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: apport before 2.17.2-0ubuntu1.1 as packaged in ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in ubuntu 14.10, before 2.14.1-0ubuntu3.11 as packaged in ubuntu 14.04 lts, and before 2.0.1-0ubuntu17.9 as packaged in ubuntu 12.04 lts allow local users to write to arbitrary files and gain root privileges by leveraging incorrect handling of permissions when generating core dumps for setuid binaries.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-08-25
Last Modified Date: 2017-08-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: apport before 2.17.2-0ubuntu1.1 as packaged in ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in ubuntu 14.10, before 2.14.1-0ubuntu3.11 as packaged in ubuntu 14.04 lts, and before 2.0.1-0ubuntu17.9 as packaged in ubuntu 12.04 lts allow local users to write to arbitrary files and gain root privileges by leveraging incorrect handling of permissions when generating core dumps for setuid binaries.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-08-25\nLast Modified Date: 2017-08-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in wpquiz 2.7 allow remote attackers to execute arbitrary sql commands via the (1) id and (2) password (pw) parameters to (a) admin.php or (b) user.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-09-24
Last Modified Date: 2010-09-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in wpquiz 2.7 allow remote attackers to execute arbitrary sql commands via the (1) id and (2) password (pw) parameters to (a) admin.php or (b) user.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-09-24\nLast Modified Date: 2010-09-27",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the ast zipcodesearch (ast_addresszipsearch) extension 0.5.4 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-07-28
Last Modified Date: 2010-07-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the ast zipcodesearch (ast_addresszipsearch) extension 0.5.4 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-07-28\nLast Modified Date: 2010-07-28",
"role": "assistant"
}
] |
CWE Code: 190
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Integer Overflow or Wraparound
Summary: in libaacdec, there is a possible out of bounds write due to an integer overflow. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112661742
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-09-27
Last Modified Date: 2019-09-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.",
"role": "user"
},
{
"content": "CWE Code: 190\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Integer Overflow or Wraparound\nSummary: in libaacdec, there is a possible out of bounds write due to an integer overflow. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112661742\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in tienda.php in bluecube cms allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-03
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in tienda.php in bluecube cms allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-03\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 352
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Cross-Site Request Forgery (CSRF)
Summary: a vulnerability in the web-based management interface of cisco meeting server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (csrf) attack and perform arbitrary actions on an affected device. the vulnerability is due to insufficient csrf protections for the web-based management interface of an affected device. an attacker could exploit this vulnerability by persuading a user of the interface to follow a customized link. a successful exploit could allow the attacker to perform arbitrary actions on an affected device by using a web browser and with the privileges of the user.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-10-05
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF).",
"role": "user"
},
{
"content": "CWE Code: 352\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Cross-Site Request Forgery (CSRF)\nSummary: a vulnerability in the web-based management interface of cisco meeting server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (csrf) attack and perform arbitrary actions on an affected device. the vulnerability is due to insufficient csrf protections for the web-based management interface of an affected device. an attacker could exploit this vulnerability by persuading a user of the interface to follow a customized link. a successful exploit could allow the attacker to perform arbitrary actions on an affected device by using a web browser and with the privileges of the user.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-10-05\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Information Exposure
Summary: vulnerability in the core rdbms component of oracle database server. supported versions that are affected are 12.2.0.1, 18c and 19c. easily exploitable vulnerability allows low privileged attacker having create session privilege with network access via oraclenet to compromise core rdbms. while the vulnerability is in core rdbms, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized read access to a subset of core rdbms accessible data. cvss 3.0 base score 5.0 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:c/c:l/i:n/a:n).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-10-16
Last Modified Date: 2019-10-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: vulnerability in the core rdbms component of oracle database server. supported versions that are affected are 12.2.0.1, 18c and 19c. easily exploitable vulnerability allows low privileged attacker having create session privilege with network access via oraclenet to compromise core rdbms. while the vulnerability is in core rdbms, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized read access to a subset of core rdbms accessible data. cvss 3.0 base score 5.0 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:c/c:l/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-10-16\nLast Modified Date: 2019-10-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in portal/find_appt_popup_user.php in versions of openemr before 5.0.1.4 allow a remote attacker to execute arbitrary sql commands via the (1) catid or (2) providerid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-08-13
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in portal/find_appt_popup_user.php in versions of openemr before 5.0.1.4 allow a remote attacker to execute arbitrary sql commands via the (1) catid or (2) providerid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-08-13\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.