text
stringlengths
365
3.97k
conversations
listlengths
3
3
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Access Control Summary: an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: kernel-3.18. android id: a-32700935. references: n-cve-2016-8435. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-01-12 Last Modified Date: 2017-01-18
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Access Control\nSummary: an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: kernel-3.18. android id: a-32700935. references: n-cve-2016-8435.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-01-18", "role": "assistant" } ]
CWE Code: 310 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Cryptographic Issues Summary: emc watch4net before 6.3 stores cleartext polled-device passwords in the installation repository, which allows local users to obtain sensitive information by leveraging repository privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2013-12-28 Last Modified Date: 2014-01-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Cryptographic Issues.", "role": "user" }, { "content": "CWE Code: 310\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Cryptographic Issues\nSummary: emc watch4net before 6.3 stores cleartext polled-device passwords in the installation repository, which allows local users to obtain sensitive information by leveraging repository privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2013-12-28\nLast Modified Date: 2014-01-08", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 5.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the web-based management interface on cisco sa 500 series security appliances with software before 2.1.19 allows remote attackers to execute arbitrary sql commands via unspecified vectors, aka bug id csctq65669. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2011-07-28 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the web-based management interface on cisco sa 500 series security appliances with software before 2.1.19 allows remote attackers to execute arbitrary sql commands via unspecified vectors, aka bug id csctq65669.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2011-07-28\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in imoveis.php in descargarvista acc imoveis 1.1 allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-11-17 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in imoveis.php in descargarvista acc imoveis 1.1 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-11-17\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in the helpdesk pro plugin before 1.4.0 for joomla! allow remote attackers to execute arbitrary sql commands via the (1) ticket_code or (2) email parameter or (3) remote authenticated users to execute arbitrary sql commands via the filter_order parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-09-20 Last Modified Date: 2017-09-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the helpdesk pro plugin before 1.4.0 for joomla! allow remote attackers to execute arbitrary sql commands via the (1) ticket_code or (2) email parameter or (3) remote authenticated users to execute arbitrary sql commands via the filter_order parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-09-20\nLast Modified Date: 2017-09-22", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the sav filter alphabetic (sav_filter_abc) extension before 1.0.9 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-03-19 Last Modified Date: 2010-06-24
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the sav filter alphabetic (sav_filter_abc) extension before 1.0.9 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-19\nLast Modified Date: 2010-06-24", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: buffer overflow in the xpdm display driver in vmware view before 4.6.1 allows guest os users to gain guest os privileges via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2012-03-16 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in the xpdm display driver in vmware view before 4.6.1 allows guest os users to gain guest os privileges via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-03-16\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: cross-site scripting (xss) vulnerability in lib/filemanager/imagemanager/editorframe.php in cms made simple 1.11.10 allows remote attackers to inject arbitrary web script or html via the action parameter, a different issue than cve-2014-0334. note: the original disclosure also reported issues that may not cross privilege boundaries. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2014-03-02 Last Modified Date: 2015-08-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: cross-site scripting (xss) vulnerability in lib/filemanager/imagemanager/editorframe.php in cms made simple 1.11.10 allows remote attackers to inject arbitrary web script or html via the action parameter, a different issue than cve-2014-0334. note: the original disclosure also reported issues that may not cross privilege boundaries.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2014-03-02\nLast Modified Date: 2015-08-13", "role": "assistant" } ]
CWE Code: 255 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Credentials Management Summary: aveva wonderware system platform 2017 update 2 and prior uses an archestra network user account for authentication of system processes and inter-node communications. a user with low privileges could make use of an api to obtain the credentials for this account. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-04-11 Last Modified Date: 2019-04-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Credentials Management.", "role": "user" }, { "content": "CWE Code: 255\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Credentials Management\nSummary: aveva wonderware system platform 2017 update 2 and prior uses an archestra network user account for authentication of system processes and inter-node communications. a user with low privileges could make use of an api to obtain the credentials for this account.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-04-11\nLast Modified Date: 2019-04-12", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: local attackers can trigger a kernel pool buffer overflow in antiy avl atool v1.0.0.22. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. the specific flaw exists within the processing of ioctl 0x80002004 by the ssdt.sys kernel driver. the bug is caused by failure to properly validate the length of the user-supplied data. an attacker can leverage this vulnerability to execute arbitrary code in the context of the kernel, which could lead to privilege escalation. a failed exploit could lead to denial of service. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-12-23 Last Modified Date: 2018-12-31
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: local attackers can trigger a kernel pool buffer overflow in antiy avl atool v1.0.0.22. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. the specific flaw exists within the processing of ioctl 0x80002004 by the ssdt.sys kernel driver. the bug is caused by failure to properly validate the length of the user-supplied data. an attacker can leverage this vulnerability to execute arbitrary code in the context of the kernel, which could lead to privilege escalation. a failed exploit could lead to denial of service.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-12-23\nLast Modified Date: 2018-12-31", "role": "assistant" } ]
CWE Code: 254 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: 7PK - Security Features Summary: adobe acrobat and reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a security bypass vulnerability. successful exploitation could lead to privilege escalation. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-05-24 Last Modified Date: 2019-08-21
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: 7PK - Security Features.", "role": "user" }, { "content": "CWE Code: 254\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: 7PK - Security Features\nSummary: adobe acrobat and reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a security bypass vulnerability. successful exploitation could lead to privilege escalation.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-05-24\nLast Modified Date: 2019-08-21", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in search_form.php in getacoder clone allows remote attackers to execute arbitrary sql commands via the sb_protype parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-07-30 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in search_form.php in getacoder clone allows remote attackers to execute arbitrary sql commands via the sb_protype parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-07-30\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: an issue was discovered in certain apple products. ios before 10.3.3 is affected. macos before 10.12.6 is affected. tvos before 10.2.2 is affected. watchos before 3.2.3 is affected. the issue involves the "libxpc" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-07-20 Last Modified Date: 2019-03-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 10.3.3 is affected. macos before 10.12.6 is affected. tvos before 10.2.2 is affected. watchos before 3.2.3 is affected. the issue involves the \"libxpc\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-07-20\nLast Modified Date: 2019-03-25", "role": "assistant" } ]
CWE Code: 125 Vulnerability Type: privilege_escalation CVSS Score: 5.0 CWE Name: Out-of-bounds Read Summary: in bluetooth, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-111214470 Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-09-27 Last Modified Date: 2019-09-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Read.", "role": "user" }, { "content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Out-of-bounds Read\nSummary: in bluetooth, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-111214470\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in index.php in rostermain 1.1 and earlier allow remote attackers to execute arbitrary sql commands via the (1) userid (username) and (2) password parameters. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-03-23 Last Modified Date: 2010-03-23
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in rostermain 1.1 and earlier allow remote attackers to execute arbitrary sql commands via the (1) userid (username) and (2) password parameters.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-23\nLast Modified Date: 2010-03-23", "role": "assistant" } ]
CWE Code: 125 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Out-of-bounds Read Summary: the vga_draw_text function in qemu allows local os guest privileged users to cause a denial of service (out-of-bounds read and qemu process crash) by leveraging improper memory address validation. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2018-01-23 Last Modified Date: 2019-03-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Read.", "role": "user" }, { "content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Out-of-bounds Read\nSummary: the vga_draw_text function in qemu allows local os guest privileged users to cause a denial of service (out-of-bounds read and qemu process crash) by leveraging improper memory address validation.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2018-01-23\nLast Modified Date: 2019-03-04", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in ovidentia 6.6.5 allows remote attackers to execute arbitrary sql commands via the field parameter in a search action. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-09-04 Last Modified Date: 2017-08-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in ovidentia 6.6.5 allows remote attackers to execute arbitrary sql commands via the field parameter in a search action. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-09-04\nLast Modified Date: 2017-08-08", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.0 CWE Name: Permissions Privileges and Access Controls Summary: ibm maximo asset management 7.x before 7.5.0.3 ifix027 and smartcloud control desk 7.x before 7.5.0.3 and 7.5.1.x before 7.5.1.2 allow remote authenticated users to gain privileges by leveraging membership in two security groups. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2014-05-26 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: ibm maximo asset management 7.x before 7.5.0.3 ifix027 and smartcloud control desk 7.x before 7.5.0.3 and 7.5.1.x before 7.5.1.2 allow remote authenticated users to gain privileges by leveraging membership in two security groups.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-05-26\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: the camerafs driver in mate 9 versions earlier than mha-al00bc00b173 has buffer overflow vulnerability. an attacker tricks a user into installing a malicious application which has the system privilege of the android system and sends a specific parameter to the driver of the smart phone, causing a system crash or privilege escalation. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-11-22 Last Modified Date: 2017-12-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the camerafs driver in mate 9 versions earlier than mha-al00bc00b173 has buffer overflow vulnerability. an attacker tricks a user into installing a malicious application which has the system privilege of the android system and sends a specific parameter to the driver of the smart phone, causing a system crash or privilege escalation.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-11-22\nLast Modified Date: 2017-12-11", "role": "assistant" } ]
CWE Code: 189 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Numeric Errors Summary: integer overflow in the kernel in apple ios before 8.4.1 and os x before 10.10.5 allows attackers to execute arbitrary code in a privileged context via a crafted app that makes unspecified iokit api calls. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-08-16 Last Modified Date: 2016-12-24
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Numeric Errors.", "role": "user" }, { "content": "CWE Code: 189\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Numeric Errors\nSummary: integer overflow in the kernel in apple ios before 8.4.1 and os x before 10.10.5 allows attackers to execute arbitrary code in a privileged context via a crafted app that makes unspecified iokit api calls.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-08-16\nLast Modified Date: 2016-12-24", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Permissions Privileges and Access Controls Summary: the client/server run-time subsystem (aka csrss) in the win32 subsystem in microsoft windows xp sp2 and sp3, server 2003 sp2, vista sp2, and server 2008 sp2, when a chinese, japanese, or korean system locale is used, can access uninitialized memory during the processing of unicode characters, which allows local users to gain privileges via a crafted application, aka "csrss elevation of privilege vulnerability." Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2012-01-10 Last Modified Date: 2019-02-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: the client/server run-time subsystem (aka csrss) in the win32 subsystem in microsoft windows xp sp2 and sp3, server 2003 sp2, vista sp2, and server 2008 sp2, when a chinese, japanese, or korean system locale is used, can access uninitialized memory during the processing of unicode characters, which allows local users to gain privileges via a crafted application, aka \"csrss elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-01-10\nLast Modified Date: 2019-02-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: phptpoint hospital management system suffers from multiple sql injection vulnerabilities via the index.php user parameter associated with login.php, or the rno parameter to alist.php, dundel.php, pdel.php, or pundel.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-10-29 Last Modified Date: 2018-12-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: phptpoint hospital management system suffers from multiple sql injection vulnerabilities via the index.php user parameter associated with login.php, or the rno parameter to alist.php, dundel.php, pdel.php, or pundel.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-10-29\nLast Modified Date: 2018-12-04", "role": "assistant" } ]
CWE Code: 275 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permission Issues Summary: for the nvidia quadro, nvs, geforce, and tesla products, nvidia gpu display driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys for windows or nvidia.ko for linux) handler where a missing permissions check may allow users to gain access to arbitrary physical memory, leading to an escalation of privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-11-08 Last Modified Date: 2017-01-20
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permission Issues.", "role": "user" }, { "content": "CWE Code: 275\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permission Issues\nSummary: for the nvidia quadro, nvs, geforce, and tesla products, nvidia gpu display driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys for windows or nvidia.ko for linux) handler where a missing permissions check may allow users to gain access to arbitrary physical memory, leading to an escalation of privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-11-08\nLast Modified Date: 2017-01-20", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Permissions Privileges and Access Controls Summary: the clone system call in the linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the clone_parent flag, and then letting this new process exit. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2009-02-27 Last Modified Date: 2018-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Permissions Privileges and Access Controls\nSummary: the clone system call in the linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the clone_parent flag, and then letting this new process exit.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2009-02-27\nLast Modified Date: 2018-10-11", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in checkavail.php in softvisions software online booking manager (obm) 2.2 allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-11-21 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in checkavail.php in softvisions software online booking manager (obm) 2.2 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-11-21\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in dbhcms 1.1.4 allows remote attackers to execute arbitrary sql commands via the editmenu parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-10-05 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in dbhcms 1.1.4 allows remote attackers to execute arbitrary sql commands via the editmenu parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-10-05\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 3.5 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: in wordpress before 4.9.9 and 5.x before 5.0.1, contributors could modify new comments made by users with greater privileges, possibly causing xss. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2018-12-14 Last Modified Date: 2019-03-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: in wordpress before 4.9.9 and 5.x before 5.0.1, contributors could modify new comments made by users with greater privileges, possibly causing xss.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2018-12-14\nLast Modified Date: 2019-03-04", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 6.6 CWE Name: Improper Input Validation Summary: an exploitable privilege escalation vulnerability exists in the way the cleanmymac x software improperly validates inputs. an attacker with local access could use this vulnerability to modify the file system as root. an attacker would need local access to the machine for a successful exploit. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/COMPLETE/COMPLETE Published Date: 2019-01-10 Last Modified Date: 2019-01-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.6\nCWE Name: Improper Input Validation\nSummary: an exploitable privilege escalation vulnerability exists in the way the cleanmymac x software improperly validates inputs. an attacker with local access could use this vulnerability to modify the file system as root. an attacker would need local access to the machine for a successful exploit.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/COMPLETE/COMPLETE\nPublished Date: 2019-01-10\nLast Modified Date: 2019-01-17", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Input Validation Summary: an issue was discovered in librenms through 1.47. the scripts that handle the graphing options (html/includes/graphs/common.inc.php and html/includes/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing sql injection attacks; other parameters are unfiltered. this allows an attacker to inject rrdtool syntax with newline characters via the html/graph.php script. rrdtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, file content, denial of service, or writing arbitrary files. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-09-09 Last Modified Date: 2019-09-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Input Validation\nSummary: an issue was discovered in librenms through 1.47. the scripts that handle the graphing options (html/includes/graphs/common.inc.php and html/includes/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing sql injection attacks; other parameters are unfiltered. this allows an attacker to inject rrdtool syntax with newline characters via the html/graph.php script. rrdtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, file content, denial of service, or writing arbitrary files.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-09\nLast Modified Date: 2019-09-10", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Improper Input Validation Summary: a denial of service vulnerability exists when microsoft hyper-v network switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'windows hyper-v denial of service vulnerability'. this cve id is unique from cve-2019-0712, cve-2019-1309, cve-2019-1399. Access Authentication: NONE Access Complexity: UNKNOWN Access Vector: UNKNOWN Impact (C/I/A): NONE/NONE/NONE Published Date: 2019-11-12 Last Modified Date: 2019-11-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Input Validation\nSummary: a denial of service vulnerability exists when microsoft hyper-v network switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'windows hyper-v denial of service vulnerability'. this cve id is unique from cve-2019-0712, cve-2019-1309, cve-2019-1399.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-12\nLast Modified Date: 2019-11-12", "role": "assistant" } ]
CWE Code: 732 Vulnerability Type: privilege_escalation CVSS Score: 9.0 CWE Name: Incorrect Permission Assignment for Critical Resource Summary: on windows installations of the mcollective-puppet-agent plugin, version 1.12.0, a non-administrator user can create an executable that will be executed with administrator privileges on the next "mco puppet" run. puppet enterprise users are not affected. this is resolved in mcollective-puppet-agent 1.12.1. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-03-03 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.", "role": "user" }, { "content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: on windows installations of the mcollective-puppet-agent plugin, version 1.12.0, a non-administrator user can create an executable that will be executed with administrator privileges on the next \"mco puppet\" run. puppet enterprise users are not affected. this is resolved in mcollective-puppet-agent 1.12.1.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-03-03\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 125 Vulnerability Type: privilege_escalation CVSS Score: 4.9 CWE Name: Out-of-bounds Read Summary: in bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: android versions: android-6.0 android-6.0.1 android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android id: a-78286118. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/NONE/NONE Published Date: 2018-11-06 Last Modified Date: 2018-12-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Read.", "role": "user" }, { "content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Out-of-bounds Read\nSummary: in bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: android versions: android-6.0 android-6.0.1 android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android id: a-78286118.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/NONE/NONE\nPublished Date: 2018-11-06\nLast Modified Date: 2018-12-12", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 5.5 CWE Name: Improper Input Validation Summary: a denial of service vulnerability exists when microsoft hyper-v on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'windows hyper-v denial of service vulnerability'. this cve id is unique from cve-2019-0710, cve-2019-0713. Access Authentication: SINGLE Access Complexity: LOW Access Vector: ADJACENT_NETWORK Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2019-06-12 Last Modified Date: 2019-06-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Input Validation\nSummary: a denial of service vulnerability exists when microsoft hyper-v on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'windows hyper-v denial of service vulnerability'. this cve id is unique from cve-2019-0710, cve-2019-0713.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2019-06-12\nLast Modified Date: 2019-06-12", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerabilities in cmg suite 8.4 sp2 and earlier, could allow an unauthenticated attacker to conduct an sql injection attack due to insufficient input validation for the login interface. a successful exploit could allow an attacker to extract sensitive information from the database and execute arbitrary scripts. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-04-25 Last Modified Date: 2019-04-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerabilities in cmg suite 8.4 sp2 and earlier, could allow an unauthenticated attacker to conduct an sql injection attack due to insufficient input validation for the login interface. a successful exploit could allow an attacker to extract sensitive information from the database and execute arbitrary scripts.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-04-25\nLast Modified Date: 2019-04-26", "role": "assistant" } ]
CWE Code: 22 Vulnerability Type: sql_injection CVSS Score: 5.0 CWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Summary: multiple directory traversal vulnerabilities in lightneasy "no database" (aka flat) version 1.2.2, and possibly sqlite version 1.2.2, allow remote attackers to read arbitrary files via a .. (dot dot) in the page parameter to (1) index.php and (2) lightneasy.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2009-04-03 Last Modified Date: 2018-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal').", "role": "user" }, { "content": "CWE Code: 22\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\nSummary: multiple directory traversal vulnerabilities in lightneasy \"no database\" (aka flat) version 1.2.2, and possibly sqlite version 1.2.2, allow remote attackers to read arbitrary files via a .. (dot dot) in the page parameter to (1) index.php and (2) lightneasy.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2009-04-03\nLast Modified Date: 2018-10-11", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Permissions Privileges and Access Controls Summary: the rpcss service in microsoft windows xp sp2 and sp3 and server 2003 sp1 and sp2 does not properly implement isolation among a set of distinct processes that (1) all run under the networkservice account or (2) all run under the localservice account, which allows local users to gain privileges by accessing the resources of one of the processes, aka "windows rpcss service isolation vulnerability." Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2009-04-15 Last Modified Date: 2019-02-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: the rpcss service in microsoft windows xp sp2 and sp3 and server 2003 sp1 and sp2 does not properly implement isolation among a set of distinct processes that (1) all run under the networkservice account or (2) all run under the localservice account, which allows local users to gain privileges by accessing the resources of one of the processes, aka \"windows rpcss service isolation vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2009-04-15\nLast Modified Date: 2019-02-26", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Access Control Summary: all versions of nvidia windows gpu display driver contain a vulnerability in the kernel mode layer handler for dxgddiescape where improper access controls may allow a user to access arbitrary physical memory, leading to an escalation of privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-12-16 Last Modified Date: 2016-12-27
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Access Control\nSummary: all versions of nvidia windows gpu display driver contain a vulnerability in the kernel mode layer handler for dxgddiescape where improper access controls may allow a user to access arbitrary physical memory, leading to an escalation of privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-12-16\nLast Modified Date: 2016-12-27", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in viewevent.php in myevent 1.6 allows remote attackers to execute arbitrary sql commands via the eventdate parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-10-22 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in viewevent.php in myevent 1.6 allows remote attackers to execute arbitrary sql commands via the eventdate parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-22\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Improper Access Control Summary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. successful attacks of this vulnerability can result in takeover of oracle vm virtualbox. cvss 3.0 base score 7.8 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:h/i:h/a:h). Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-01-16 Last Modified Date: 2019-06-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. successful attacks of this vulnerability can result in takeover of oracle vm virtualbox. cvss 3.0 base score 7.8 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:h/i:h/a:h).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-01-16\nLast Modified Date: 2019-06-11", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection exists in the saxum picker 3.2.10 component for joomla! via the publicid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-02-17 Last Modified Date: 2018-03-02
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in the saxum picker 3.2.10 component for joomla! via the publicid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-02-17\nLast Modified Date: 2018-03-02", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: the dronedeleteoldmeasurements implementation in ipswitch whatsup gold before 16.4 does not properly validate serialized xml objects, which allows remote attackers to conduct sql injection attacks via a crafted soap request. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-01-08 Last Modified Date: 2017-09-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the dronedeleteoldmeasurements implementation in ipswitch whatsup gold before 16.4 does not properly validate serialized xml objects, which allows remote attackers to conduct sql injection attacks via a crafted soap request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-01-08\nLast Modified Date: 2017-09-10", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in findoffice.php in check up new generation (aka check new) 4.52, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the search parameter. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-12-16 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in findoffice.php in check up new generation (aka check new) 4.52, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the search parameter.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-16\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Improper Input Validation Summary: eval injection in the math plugin of limnoria (before 2019.11.09) and supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc irc commands. Access Authentication: NONE Access Complexity: UNKNOWN Access Vector: UNKNOWN Impact (C/I/A): NONE/NONE/NONE Published Date: 2019-11-16 Last Modified Date: 2019-11-16
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Improper Input Validation\nSummary: eval injection in the math plugin of limnoria (before 2019.11.09) and supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc irc commands.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-16\nLast Modified Date: 2019-11-16", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Improper Access Control Summary: the api web interface in cisco prime infrastructure before 3.1 and cisco evolved programmable network manager before 1.2.4 allows remote authenticated users to bypass intended rbac restrictions and obtain sensitive information, and consequently gain privileges, via crafted json data, aka bug id cscuy12409. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-05-25 Last Modified Date: 2019-07-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Access Control\nSummary: the api web interface in cisco prime infrastructure before 3.1 and cisco evolved programmable network manager before 1.2.4 allows remote authenticated users to bypass intended rbac restrictions and obtain sensitive information, and consequently gain privileges, via crafted json data, aka bug id cscuy12409.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-05-25\nLast Modified Date: 2019-07-29", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 2.6 CWE Name: Information Exposure Summary: an information disclosure vulnerability in the nvidia video driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31495687. references: n-cve-2016-8409. Access Authentication: NONE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2017-01-12 Last Modified Date: 2017-01-18
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.6\nCWE Name: Information Exposure\nSummary: an information disclosure vulnerability in the nvidia video driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31495687. references: n-cve-2016-8409.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-01-18", "role": "assistant" } ]
CWE Code: 704 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Incorrect Type Conversion or Cast Summary: an issue was discovered in certain apple products. macos before 10.12.2 is affected. the issue involves the "bluetooth" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (type confusion) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-02-20 Last Modified Date: 2017-09-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Type Conversion or Cast.", "role": "user" }, { "content": "CWE Code: 704\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Incorrect Type Conversion or Cast\nSummary: an issue was discovered in certain apple products. macos before 10.12.2 is affected. the issue involves the \"bluetooth\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (type confusion) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-02-20\nLast Modified Date: 2017-09-03", "role": "assistant" } ]
CWE Code: 281 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Preservation of Permissions Summary: microsoft windows 8.1 and windows rt 8.1, windows server 2012 r2, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allow an attacker to run processes in an elevated context when the windows kernel improperly handles objects in memory, aka "win32k elevation of privilege vulnerability." this cve id is unique from cve-2017-8465. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-06-15 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Preservation of Permissions.", "role": "user" }, { "content": "CWE Code: 281\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Preservation of Permissions\nSummary: microsoft windows 8.1 and windows rt 8.1, windows server 2012 r2, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allow an attacker to run processes in an elevated context when the windows kernel improperly handles objects in memory, aka \"win32k elevation of privilege vulnerability.\" this cve id is unique from cve-2017-8465.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-06-15\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in members.php in yabsoft mega file hosting script (aka mfh or mfhs) 1.2 allows remote authenticated users to execute arbitrary sql commands via the fid parameter. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-06-03 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in members.php in yabsoft mega file hosting script (aka mfh or mfhs) 1.2 allows remote authenticated users to execute arbitrary sql commands via the fid parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-03\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: ibm spectrum protect servers 7.1 and 8.1 and storage agents could allow a local attacker to gain elevated privileges on the system, caused by loading a specially crafted library loaded by the dsmqsan module. by setting up such a library, a local attacker could exploit this vulnerability to gain root privileges on the vulnerable system. ibm x-force id: 157511. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-07-02 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: ibm spectrum protect servers 7.1 and 8.1 and storage agents could allow a local attacker to gain elevated privileges on the system, caused by loading a specially crafted library loaded by the dsmqsan module. by setting up such a library, a local attacker could exploit this vulnerability to gain root privileges on the vulnerable system. ibm x-force id: 157511.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-07-02\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in index.php in acg news 1.0 allow remote attackers to execute arbitrary sql commands via (1) the aid parameter in a showarticle action or (2) the catid parameter in a showcat action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-08-31 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in acg news 1.0 allow remote attackers to execute arbitrary sql commands via (1) the aid parameter in a showarticle action or (2) the catid parameter in a showcat action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-08-31\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: the xpdm display driver in vmware esxi 4.0, 4.1, and 5.0; vmware esx 4.0 and 4.1; and vmware view before 4.6.1 allows guest os users to gain guest os privileges or cause a denial of service (null pointer dereference) via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2012-03-16 Last Modified Date: 2017-12-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the xpdm display driver in vmware esxi 4.0, 4.1, and 5.0; vmware esx 4.0 and 4.1; and vmware view before 4.6.1 allows guest os users to gain guest os privileges or cause a denial of service (null pointer dereference) via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-03-16\nLast Modified Date: 2017-12-13", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: buffer overflow in libsrtp in ingate firewall before 4.6.0 and siparator before 4.6.0 has unknown impact and attack vectors. note: it is not clear whether this issue crosses privilege boundaries. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2007-11-22 Last Modified Date: 2008-11-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in libsrtp in ingate firewall before 4.6.0 and siparator before 4.6.0 has unknown impact and attack vectors. note: it is not clear whether this issue crosses privilege boundaries.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2007-11-22\nLast Modified Date: 2008-11-15", "role": "assistant" } ]
CWE Code: 78 Vulnerability Type: sql_injection CVSS Score: 10.0 CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Summary: in the mmm::agent::helpers::network::clear_ip function in mysql multi-master replication manager (mmm) mmm_agentd 2.2.1 (for freebsd), a specially crafted mmm protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. an attacker that can initiate a tcp session with mmm\_agentd can trigger this vulnerability. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-05-09 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').", "role": "user" }, { "content": "CWE Code: 78\nVulnerability Type: sql_injection\nCVSS Score: 10.0\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: in the mmm::agent::helpers::network::clear_ip function in mysql multi-master replication manager (mmm) mmm_agentd 2.2.1 (for freebsd), a specially crafted mmm protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\\_agentd process. an attacker that can initiate a tcp session with mmm\\_agentd can trigger this vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-05-09\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the gantry (com_gantry) component 3.0.10 for joomla! allows remote attackers to execute arbitrary sql commands via the moduleid parameter to index.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-10-08 Last Modified Date: 2012-05-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the gantry (com_gantry) component 3.0.10 for joomla! allows remote attackers to execute arbitrary sql commands via the moduleid parameter to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-10-08\nLast Modified Date: 2012-05-14", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in lib/toolkit/events/event.section.php in symphony cms 2.0.7 and 2.1.1 allows remote attackers to execute arbitrary sql commands via the send-email[recipient] parameter to about/. note: some of these details are obtained from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-09-17 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in lib/toolkit/events/event.section.php in symphony cms 2.0.7 and 2.1.1 allows remote attackers to execute arbitrary sql commands via the send-email[recipient] parameter to about/. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-09-17\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the authentication functionality in trend micro email encryption gateway (tmeeg) 5.5 before build 1107 allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-05-05 Last Modified Date: 2016-05-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the authentication functionality in trend micro email encryption gateway (tmeeg) 5.5 before build 1107 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-05-05\nLast Modified Date: 2016-05-09", "role": "assistant" } ]
CWE Code: 434 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Unrestricted Upload of File with Dangerous Type Summary: vulnerability in wordpress plugin membership-simplified-for-oap-members-only v1.58, the file download code located membership-simplified-for-oap-members-only/download.php does not check whether a user is logged in and has download privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-09-14 Last Modified Date: 2017-09-27
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Unrestricted Upload of File with Dangerous Type.", "role": "user" }, { "content": "CWE Code: 434\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Unrestricted Upload of File with Dangerous Type\nSummary: vulnerability in wordpress plugin membership-simplified-for-oap-members-only v1.58, the file download code located membership-simplified-for-oap-members-only/download.php does not check whether a user is logged in and has download privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-09-14\nLast Modified Date: 2017-09-27", "role": "assistant" } ]
CWE Code: 787 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Out-of-bounds Write Summary: a remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. this issue is rated as high due to the possibility of remote code execution in an application that uses this library. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-37104170. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-06-14 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Write.", "role": "user" }, { "content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Out-of-bounds Write\nSummary: a remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. this issue is rated as high due to the possibility of remote code execution in an application that uses this library. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-37104170.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-06-14\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Permissions Privileges and Access Controls Summary: the kernel in android before 2016-08-05 on nexus 7 (2013) devices allows attackers to gain privileges via a crafted application, aka internal bug 28522518. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-08-05 Last Modified Date: 2016-08-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: the kernel in android before 2016-08-05 on nexus 7 (2013) devices allows attackers to gain privileges via a crafted application, aka internal bug 28522518.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-08-05\nLast Modified Date: 2016-08-10", "role": "assistant" } ]
CWE Code: 436 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Interpretation Conflict Summary: an issue was discovered in xen through 4.11.x allowing x86 pv guest os users to cause a denial of service (host os crash) or possibly gain host os privileges because of an interpretation conflict for a union data structure associated with shadow paging. note: this issue exists because of an incorrect fix for cve-2017-15595. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-12-08 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Interpretation Conflict.", "role": "user" }, { "content": "CWE Code: 436\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Interpretation Conflict\nSummary: an issue was discovered in xen through 4.11.x allowing x86 pv guest os users to cause a denial of service (host os crash) or possibly gain host os privileges because of an interpretation conflict for a union data structure associated with shadow paging. note: this issue exists because of an incorrect fix for cve-2017-15595.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-12-08\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: heap-based buffer overflow in the ldm_frag_add function in fs/partitions/ldm.c in the linux kernel 2.6.37.2 and earlier might allow local users to gain privileges or obtain sensitive information via a crafted ldm partition table. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2011-03-01 Last Modified Date: 2018-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: heap-based buffer overflow in the ldm_frag_add function in fs/partitions/ldm.c in the linux kernel 2.6.37.2 and earlier might allow local users to gain privileges or obtain sensitive information via a crafted ldm partition table.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2011-03-01\nLast Modified Date: 2018-10-09", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 3.5 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: stored xss vulnerability in the media objects component of ilias before 5.1.21 and 5.2.x before 5.2.9 allows an authenticated user to inject javascript to gain administrator privileges, related to the setparameter function in services/mediaobjects/classes/class.ilmediaitem.php. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2017-10-17 Last Modified Date: 2018-06-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: stored xss vulnerability in the media objects component of ilias before 5.1.21 and 5.2.x before 5.2.9 allows an authenticated user to inject javascript to gain administrator privileges, related to the setparameter function in services/mediaobjects/classes/class.ilmediaitem.php.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2017-10-17\nLast Modified Date: 2018-06-19", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: an issue was discovered in ofcms before 1.1.3. it allows admin/system/generate/create?sql= sql injection, related to systemgeneratecontroller.java. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-03-06 Last Modified Date: 2019-03-07
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in ofcms before 1.1.3. it allows admin/system/generate/create?sql= sql injection, related to systemgeneratecontroller.java.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-03-06\nLast Modified Date: 2019-03-07", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: sql_injection CVSS Score: 4.3 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: cross-site scripting (xss) vulnerability in as_archives.php in phpadultsite cms, possibly 2.3.2, allows remote attackers to inject arbitrary web script or html via the results_per_page parameter to index.php. note: some of these details are obtained from third party information. note: this issue might be resultant from a separate sql injection vulnerability. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2009-08-19 Last Modified Date: 2018-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: sql_injection\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: cross-site scripting (xss) vulnerability in as_archives.php in phpadultsite cms, possibly 2.3.2, allows remote attackers to inject arbitrary web script or html via the results_per_page parameter to index.php. note: some of these details are obtained from third party information. note: this issue might be resultant from a separate sql injection vulnerability.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2009-08-19\nLast Modified Date: 2018-10-11", "role": "assistant" } ]
CWE Code: 434 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Unrestricted Upload of File with Dangerous Type Summary: a vulnerability in the web ui framework of cisco ios xe software could allow an authenticated, remote attacker to make unauthorized changes to the filesystem of the affected device. the vulnerability is due to improper input validation. an attacker could exploit this vulnerability by crafting a malicious file and uploading it to the device. an exploit could allow the attacker to gain elevated privileges on the affected device. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-03-28 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Unrestricted Upload of File with Dangerous Type.", "role": "user" }, { "content": "CWE Code: 434\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Unrestricted Upload of File with Dangerous Type\nSummary: a vulnerability in the web ui framework of cisco ios xe software could allow an authenticated, remote attacker to make unauthorized changes to the filesystem of the affected device. the vulnerability is due to improper input validation. an attacker could exploit this vulnerability by crafting a malicious file and uploading it to the device. an exploit could allow the attacker to gain elevated privileges on the affected device.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-03-28\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Input Validation Summary: win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 gold, sp2, and r2, and windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "win32k window class pointer confusion vulnerability." Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2011-02-09 Last Modified Date: 2019-02-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 gold, sp2, and r2, and windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka \"win32k window class pointer confusion vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2011-02-09\nLast Modified Date: 2019-02-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in classes/gelato.class.php in gelato allows remote attackers to execute arbitrary sql commands via the post parameter to index.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-09-17 Last Modified Date: 2018-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in classes/gelato.class.php in gelato allows remote attackers to execute arbitrary sql commands via the post parameter to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-09-17\nLast Modified Date: 2018-10-15", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Permissions Privileges and Access Controls Summary: the check_privileges method in vmdb/app/controllers/application_controller.rb in manageiq, as used in red hat cloudforms management engine (cfme), allows remote authenticated users to bypass authorization and gain privileges by leveraging improper rbac checking, related to the rbac_user_edit action. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-01-11 Last Modified Date: 2018-12-18
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: the check_privileges method in vmdb/app/controllers/application_controller.rb in manageiq, as used in red hat cloudforms management engine (cfme), allows remote authenticated users to bypass authorization and gain privileges by leveraging improper rbac checking, related to the rbac_user_edit action.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-01-11\nLast Modified Date: 2018-12-18", "role": "assistant" } ]
CWE Code: 77 Vulnerability Type: privilege_escalation CVSS Score: 9.0 CWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection') Summary: in ubiquiti networks edgeswitch x v1.1.0 and prior, a privileged user can execute arbitrary shell commands over the ssh cli interface. this allows to execute shell commands under the root user. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-04-10 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in a Command ('Command Injection').", "role": "user" }, { "content": "CWE Code: 77\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')\nSummary: in ubiquiti networks edgeswitch x v1.1.0 and prior, a privileged user can execute arbitrary shell commands over the ssh cli interface. this allows to execute shell commands under the root user.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-04-10\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 3.5 CWE Name: Improper Input Validation Summary: the transwiki import functionality in mediawiki before 1.16.3 does not properly check privileges, which allows remote authenticated users to perform imports from any wgimportsources wiki via a crafted post request. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2011-04-27 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Input Validation\nSummary: the transwiki import functionality in mediawiki before 1.16.3 does not properly check privileges, which allows remote authenticated users to perform imports from any wgimportsources wiki via a crafted post request.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2011-04-27\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 787 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Out-of-bounds Write Summary: in ixheaacd_reset_acelp_data_fix of ixheaacd_lpc.c there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-9. android id: a-112858010 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-11-14 Last Modified Date: 2018-12-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Write.", "role": "user" }, { "content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Out-of-bounds Write\nSummary: in ixheaacd_reset_acelp_data_fix of ixheaacd_lpc.c there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-9. android id: a-112858010\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-11-14\nLast Modified Date: 2018-12-14", "role": "assistant" } ]
CWE Code: 190 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Integer Overflow or Wraparound Summary: sqlite before 3.25.3, when the fts3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for fts3 queries that occur after crafted changes to fts3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary sql statements (such as in certain websql use cases), aka magellan. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-12-21 Last Modified Date: 2019-06-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.", "role": "user" }, { "content": "CWE Code: 190\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Integer Overflow or Wraparound\nSummary: sqlite before 3.25.3, when the fts3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for fts3 queries that occur after crafted changes to fts3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary sql statements (such as in certain websql use cases), aka magellan.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-12-21\nLast Modified Date: 2019-06-19", "role": "assistant" } ]
CWE Code: 125 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Out-of-bounds Read Summary: in v4l2slicevideodecodeaccelerator::dequeue of v4l2_slice_video_decode_accelerator.cc, there is a possible out of bounds read of a function pointer due to an incorrect bounds check. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android-8.1 android-9. android id: a-112181526. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-12-06 Last Modified Date: 2019-01-02
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Read.", "role": "user" }, { "content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Out-of-bounds Read\nSummary: in v4l2slicevideodecodeaccelerator::dequeue of v4l2_slice_video_decode_accelerator.cc, there is a possible out of bounds read of a function pointer due to an incorrect bounds check. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android-8.1 android-9. android id: a-112181526.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-12-06\nLast Modified Date: 2019-01-02", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: the x86-64 kernel system-call functionality in xen 4.1.2 and earlier, as used in citrix xenserver 6.0.2 and earlier and other products; oracle solaris 11 and earlier; illumos before r13724; joyent smartos before 20120614t184600z; freebsd before 9.0-release-p3; netbsd 6.0 beta and earlier; microsoft windows server 2008 r2 and r2 sp1 and windows 7 gold and sp1; and possibly other operating systems, when running on an intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. note: because this issue is due to incorrect use of the intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier. per: http://technet.microsoft.com/en-us/security/bulletin/ms12-042 'this vulnerability only affects intel x64-based versions of windows 7 and windows server 2008 r2. systems with amd or arm-based cpus are not affected by this vulnerability.' Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2012-06-12 Last Modified Date: 2019-03-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the x86-64 kernel system-call functionality in xen 4.1.2 and earlier, as used in citrix xenserver 6.0.2 and earlier and other products; oracle solaris 11 and earlier; illumos before r13724; joyent smartos before 20120614t184600z; freebsd before 9.0-release-p3; netbsd 6.0 beta and earlier; microsoft windows server 2008 r2 and r2 sp1 and windows 7 gold and sp1; and possibly other operating systems, when running on an intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. note: because this issue is due to incorrect use of the intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier. per: http://technet.microsoft.com/en-us/security/bulletin/ms12-042\r\n\r\n'this vulnerability only affects intel x64-based versions of windows 7 and windows server 2008 r2. systems with amd or arm-based cpus are not affected by this vulnerability.'\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-06-12\nLast Modified Date: 2019-03-08", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 9.0 CWE Name: Improper Input Validation Summary: sun java system identity manager (idm) 7.0 through 8.0 allows remote authenticated users to gain privileges by submitting crafted commands to the admin console, as demonstrated by privileges for account creation and other administrative capabilities, related to the savenovalidate action and savenovalidateallowedformsandworkflows ids. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2009-03-25 Last Modified Date: 2009-03-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Input Validation\nSummary: sun java system identity manager (idm) 7.0 through 8.0 allows remote authenticated users to gain privileges by submitting crafted commands to the admin console, as demonstrated by privileges for account creation and other administrative capabilities, related to the savenovalidate action and savenovalidateallowedformsandworkflows ids.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2009-03-25\nLast Modified Date: 2009-03-25", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: k7sentry.sys in k7 computing ultimate security, anti-virus plus, and total security before 14.2.0.253 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, or 0x950025c8 ioctl call. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-02-06 Last Modified Date: 2015-02-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: k7sentry.sys in k7 computing ultimate security, anti-virus plus, and total security before 14.2.0.253 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, or 0x950025c8 ioctl call.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-02-06\nLast Modified Date: 2015-02-09", "role": "assistant" } ]
CWE Code: 426 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Untrusted Search Path Summary: flash player versions 31.0.0.153 and earlier, and 31.0.0.108 and earlier have an insecure library loading (dll hijacking) vulnerability. successful exploitation could lead to privilege escalation. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-01-18 Last Modified Date: 2019-01-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Untrusted Search Path.", "role": "user" }, { "content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Untrusted Search Path\nSummary: flash player versions 31.0.0.153 and earlier, and 31.0.0.108 and earlier have an insecure library loading (dll hijacking) vulnerability. successful exploitation could lead to privilege escalation.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-01-18\nLast Modified Date: 2019-01-28", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Improper Input Validation Summary: ca siteminder federation (fss) 12.5, 12.0, and r6; federation (standalone) 12.1 and 12.0; agent for sharepoint 2010; and siteminder for secure proxy server 6.0, 12.0, and 12.5 does not properly verify xml signatures for saml statements, which allows remote attackers to spoof other users and gain privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2013-03-21 Last Modified Date: 2018-08-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Improper Input Validation\nSummary: ca siteminder federation (fss) 12.5, 12.0, and r6; federation (standalone) 12.1 and 12.0; agent for sharepoint 2010; and siteminder for secure proxy server 6.0, 12.0, and 12.5 does not properly verify xml signatures for saml statements, which allows remote attackers to spoof other users and gain privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-03-21\nLast Modified Date: 2018-08-13", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 3.5 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: there is a reflected xss vulnerability in wordpress arigato autoresponder and news letter v2.5.1.8 this vulnerability requires administrative privileges to exploit. there is an xss vulnerability in unsubscribe.html.php:3: via get reuqest to the email variable. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2018-12-03 Last Modified Date: 2018-12-27
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: there is a reflected xss vulnerability in wordpress arigato autoresponder and news letter v2.5.1.8 this vulnerability requires administrative privileges to exploit. there is an xss vulnerability in unsubscribe.html.php:3: via get reuqest to the email variable.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2018-12-03\nLast Modified Date: 2018-12-27", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 1.9 CWE Name: Information Exposure Summary: a named pipe request processing out-of-bounds read information disclosure vulnerability in trend micro officescan xg (12.0) could allow a local attacker to disclose sensitive information on vulnerable installations. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2018-08-30 Last Modified Date: 2018-11-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 1.9\nCWE Name: Information Exposure\nSummary: a named pipe request processing out-of-bounds read information disclosure vulnerability in trend micro officescan xg (12.0) could allow a local attacker to disclose sensitive information on vulnerable installations. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-08-30\nLast Modified Date: 2018-11-08", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the category file in modules.php in the emporium 2.3.0 and earlier module for php-nuke allows remote attackers to execute arbitrary sql commands via the category_id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-02-21 Last Modified Date: 2018-10-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the category file in modules.php in the emporium 2.3.0 and earlier module for php-nuke allows remote attackers to execute arbitrary sql commands via the category_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-02-21\nLast Modified Date: 2018-10-19", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in processview.asp in techno dreams (t-dreams) cars ads package 2.0 allows remote attackers to execute arbitrary sql commands via the key parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-08-24 Last Modified Date: 2011-08-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in processview.asp in techno dreams (t-dreams) cars ads package 2.0 allows remote attackers to execute arbitrary sql commands via the key parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-08-24\nLast Modified Date: 2011-08-25", "role": "assistant" } ]
CWE Code: 287 Vulnerability Type: privilege_escalation CVSS Score: 6.0 CWE Name: Improper Authentication Summary: apache solr's kerberos plugin can be configured to use delegation tokens, which allows an application to reuse the authentication of an end-user or another application. there are two issues with this functionality (when using securityawarezkaclprovider type of acl provider e.g. saslzkaclprovider). firstly, access to the security configuration can be leaked to users other than the solr super user. secondly, malicious users can exploit this leaked configuration for privilege escalation to further expose/modify private data and/or disrupt operations in the solr cluster. the vulnerability is fixed from apache solr 6.6.1 onwards. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-09-18 Last Modified Date: 2019-03-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Authentication.", "role": "user" }, { "content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 6.0\nCWE Name: Improper Authentication\nSummary: apache solr's kerberos plugin can be configured to use delegation tokens, which allows an application to reuse the authentication of an end-user or another application. there are two issues with this functionality (when using securityawarezkaclprovider type of acl provider e.g. saslzkaclprovider). firstly, access to the security configuration can be leaked to users other than the solr super user. secondly, malicious users can exploit this leaked configuration for privilege escalation to further expose/modify private data and/or disrupt operations in the solr cluster. the vulnerability is fixed from apache solr 6.6.1 onwards.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-09-18\nLast Modified Date: 2019-03-08", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in easywebrealestate allow remote attackers to execute arbitrary sql commands via the (1) lstid parameter to listings.php or (2) infoid parameter to index.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2012-10-04 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in easywebrealestate allow remote attackers to execute arbitrary sql commands via the (1) lstid parameter to listings.php or (2) infoid parameter to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-10-04\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: an sql injection vulnerability was found in cloudera data science workbench (cdsw) 1.4.0 through 1.4.2. this would allow any authenticated user to run arbitrary queries against cdsw's internal database. the database contains user contact information, encrypted cdsw passwords (in the case of local authentication), api keys, and stored kerberos keytabs. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-06-07 Last Modified Date: 2019-06-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an sql injection vulnerability was found in cloudera data science workbench (cdsw) 1.4.0 through 1.4.2. this would allow any authenticated user to run arbitrary queries against cdsw's internal database. the database contains user contact information, encrypted cdsw passwords (in the case of local authentication), api keys, and stored kerberos keytabs.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-06-07\nLast Modified Date: 2019-06-10", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 10.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: cpanel before 57.9999.54 allows sql injection via the modsecurity tailwatch log file (sec-123). Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-08-01 Last Modified Date: 2019-08-06
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 10.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: cpanel before 57.9999.54 allows sql injection via the modsecurity tailwatch log file (sec-123).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-08-01\nLast Modified Date: 2019-08-06", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in energine, possibly 2.3.8 and earlier, allows remote attackers to execute arbitrary sql commands via the nrgnsid cookie. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-11-05 Last Modified Date: 2018-10-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in energine, possibly 2.3.8 and earlier, allows remote attackers to execute arbitrary sql commands via the nrgnsid cookie.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-11-05\nLast Modified Date: 2018-10-10", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Permissions Privileges and Access Controls Summary: the xpcsafejsobjectwrapper class in the safejsobjectwrapper (aka sjow) implementation in mozilla firefox 3.6.x before 3.6.9 and thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary javascript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-09-09 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: the xpcsafejsobjectwrapper class in the safejsobjectwrapper (aka sjow) implementation in mozilla firefox 3.6.x before 3.6.9 and thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary javascript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-09-09\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 276 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Incorrect Default Permissions Summary: ieee802154_create in net/ieee802154/socket.c in the af_ieee802154 network module in the linux kernel through 5.3.2 does not enforce cap_net_raw, which means that unprivileged users can create a raw socket, aka cid-e69dbd4619e7. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2019-10-01 Last Modified Date: 2019-10-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Default Permissions.", "role": "user" }, { "content": "CWE Code: 276\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Incorrect Default Permissions\nSummary: ieee802154_create in net/ieee802154/socket.c in the af_ieee802154 network module in the linux kernel through 5.3.2 does not enforce cap_net_raw, which means that unprivileged users can create a raw socket, aka cid-e69dbd4619e7.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-10-01\nLast Modified Date: 2019-10-25", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in active web softwares ewebquiz 8 allow remote attackers to execute arbitrary sql commands via the quizid parameter to (1) questions.asp, (2) importquestions.asp, and (3) quiztakers.asp, different vectors than cve-2007-1706. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-12-28 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in active web softwares ewebquiz 8 allow remote attackers to execute arbitrary sql commands via the quizid parameter to (1) questions.asp, (2) importquestions.asp, and (3) quiztakers.asp, different vectors than cve-2007-1706.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-28\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 502 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Deserialization of Untrusted Data Summary: deserialization vulnerability in synophoto_csphotomisc.php in synology photo station before 6.7.3-3432 and 6.3-2967 allows remote attackers to gain administrator privileges via a crafted serialized payload. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-08-08 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Deserialization of Untrusted Data.", "role": "user" }, { "content": "CWE Code: 502\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Deserialization of Untrusted Data\nSummary: deserialization vulnerability in synophoto_csphotomisc.php in synology photo station before 6.7.3-3432 and 6.3-2967 allows remote attackers to gain administrator privileges via a crafted serialized payload.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-08-08\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 427 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Uncontrolled Search Path Element Summary: an uncontrolled search path element issue was discovered in moxa softnvr-ia live viewer, version 3.30.3122 and prior versions. an uncontrolled search path element (dll hijacking) vulnerability has been identified. to exploit this vulnerability, an attacker could rename a malicious dll to meet the criteria of the application, and the application would not verify that the dll is correct. the attacker needs to have administrative access to the default install location in order to plant the insecure dll. once loaded by the application, the dll could run malicious code at the privilege level of the application. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-01-18 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Uncontrolled Search Path Element.", "role": "user" }, { "content": "CWE Code: 427\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Uncontrolled Search Path Element\nSummary: an uncontrolled search path element issue was discovered in moxa softnvr-ia live viewer, version 3.30.3122 and prior versions. an uncontrolled search path element (dll hijacking) vulnerability has been identified. to exploit this vulnerability, an attacker could rename a malicious dll to meet the criteria of the application, and the application would not verify that the dll is correct. the attacker needs to have administrative access to the default install location in order to plant the insecure dll. once loaded by the application, the dll could run malicious code at the privilege level of the application.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-01-18\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 5.5 CWE Name: Information Exposure Summary: when an apache geode cluster before v1.3.0 is operating in secure mode and an authenticated user connects to a geode cluster using the gfsh tool with http, the user is able to obtain status information and control cluster members even without cluster:manage privileges. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/NONE Published Date: 2018-01-10 Last Modified Date: 2018-02-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Information Exposure\nSummary: when an apache geode cluster before v1.3.0 is operating in secure mode and an authenticated user connects to a geode cluster using the gfsh tool with http, the user is able to obtain status information and control cluster members even without cluster:manage privileges.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2018-01-10\nLast Modified Date: 2018-02-01", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in login.do in manageengine oputils 5.0 allows remote attackers to execute arbitrary sql commands via the ishttpport parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-03-23 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in login.do in manageengine oputils 5.0 allows remote attackers to execute arbitrary sql commands via the ishttpport parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-23\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 4.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: the list users api of piwigo 2.9.2 is vulnerable to sql injection via the /admin/user_list_backend.php ssortdir_0 parameter. an attacker can exploit this to gain access to the data in a connected mysql database. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2017-12-21 Last Modified Date: 2018-01-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 4.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the list users api of piwigo 2.9.2 is vulnerable to sql injection via the /admin/user_list_backend.php ssortdir_0 parameter. an attacker can exploit this to gain access to the data in a connected mysql database.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-12-21\nLast Modified Date: 2018-01-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 9.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: a sql injection code execution vulnerability was identified in hpe intelligent management center (imc) plat earlier than version 7.3 e0506p09. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-06-05 Last Modified Date: 2019-06-07
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 9.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection code execution vulnerability was identified in hpe intelligent management center (imc) plat earlier than version 7.3 e0506p09.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-05\nLast Modified Date: 2019-06-07", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 5.0 CWE Name: Information Exposure Summary: adobe flash player versions 30.0.0.154 and earlier have a privilege escalation vulnerability. successful exploitation could lead to information disclosure. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2018-09-25 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Information Exposure\nSummary: adobe flash player versions 30.0.0.154 and earlier have a privilege escalation vulnerability. successful exploitation could lead to information disclosure.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-09-25\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Permissions Privileges and Access Controls Summary: a vulnerability has been identified in tia administrator (all versions < v1.0 sp1 upd1). the integrated configuration web application (tia administrator) allows to execute certain application commands without proper authentication. the vulnerability could be exploited by an attacker with local access to the affected system. successful exploitation requires no privileges and no user interaction. an attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. at the time of advisory publication no public exploitation of this security vulnerability was known. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-07-11 Last Modified Date: 2019-09-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: a vulnerability has been identified in tia administrator (all versions < v1.0 sp1 upd1). the integrated configuration web application (tia administrator) allows to execute certain application commands without proper authentication. the vulnerability could be exploited by an attacker with local access to the affected system. successful exploitation requires no privileges and no user interaction. an attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. at the time of advisory publication no public exploitation of this security vulnerability was known.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-11\nLast Modified Date: 2019-09-10", "role": "assistant" } ]
CWE Code: 798 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Use of Hard-coded Credentials Summary: an attacker without authentication can login with default credentials for privileged users in eltex esp-200 firmware version 1.2.0. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-08-17 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Use of Hard-coded Credentials.", "role": "user" }, { "content": "CWE Code: 798\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Use of Hard-coded Credentials\nSummary: an attacker without authentication can login with default credentials for privileged users in eltex esp-200 firmware version 1.2.0.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-08-17\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the jooblog (com_jb2) component 0.1.1 for joomla! allows remote attackers to execute arbitrary sql commands via the categoryid parameter in a category action to index.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-06-10 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the jooblog (com_jb2) component 0.1.1 for joomla! allows remote attackers to execute arbitrary sql commands via the categoryid parameter in a category action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-10\nLast Modified Date: 2017-09-29", "role": "assistant" } ]