text
stringlengths 365
3.97k
| conversations
listlengths 3
3
|
---|---|
CWE Code: 428
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Unquoted Search Path or Element
Summary: unquoted windows search path vulnerability in the ptservice service in privatetunnel 2.3.8, as bundled in openvpn 2.1.28.0 allows local users to gain privileges via a crafted program.exe file in the %systemdrive% folder. <a href="http://cwe.mitre.org/data/definitions/428.html" target="_blank">cwe-428: unquoted search path or element</a>
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-08-25
Last Modified Date: 2016-11-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Unquoted Search Path or Element.",
"role": "user"
},
{
"content": "CWE Code: 428\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Unquoted Search Path or Element\nSummary: unquoted windows search path vulnerability in the ptservice service in privatetunnel 2.3.8, as bundled in openvpn 2.1.28.0 allows local users to gain privileges via a crafted program.exe file in the %systemdrive% folder. <a href=\"http://cwe.mitre.org/data/definitions/428.html\" target=\"_blank\">cwe-428: unquoted search path or element</a>\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-08-25\nLast Modified Date: 2016-11-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in admin/login.php in deltascripts php shop 1.0 allows remote attackers to execute arbitrary sql commands via the admin_username parameter. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-12-17
Last Modified Date: 2017-10-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in admin/login.php in deltascripts php shop 1.0 allows remote attackers to execute arbitrary sql commands via the admin_username parameter. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-17\nLast Modified Date: 2017-10-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in includes/mode-edit.php in the simple retail menus (simple-retail-menus) plugin before 4.1 for wordpress allows remote authenticated editors to execute arbitrary sql commands via the targetmenu parameter in an edit action to wp-admin/admin.php.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-08-06
Last Modified Date: 2014-08-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in includes/mode-edit.php in the simple retail menus (simple-retail-menus) plugin before 4.1 for wordpress allows remote authenticated editors to execute arbitrary sql commands via the targetmenu parameter in an edit action to wp-admin/admin.php.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-08-06\nLast Modified Date: 2014-08-07",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in accountstatus.jsp in admin portal of sophos xg firewall 17.0.8 mr-8 allow remote authenticated attackers to execute arbitrary sql commands via the "username" get parameter.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-06-20
Last Modified Date: 2019-06-24 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in accountstatus.jsp in admin portal of sophos xg firewall 17.0.8 mr-8 allow remote authenticated attackers to execute arbitrary sql commands via the \"username\" get parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-06-20\nLast Modified Date: 2019-06-24",
"role": "assistant"
}
] |
CWE Code: 281
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Preservation of Permissions
Summary: a kernel-mode driver in microsoft windows xp sp3, windows xp x64 xp2, windows server 2003 sp2, windows vista, windows 7 sp1, windows server 2008 sp2 and r2 sp1, and windows 8 allows an elevation of privilege when it fails to properly handle objects in memory, aka "win32k elevation of privilege vulnerability". this cve is unique from cve-2017-0263.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-06-15
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Preservation of Permissions.",
"role": "user"
},
{
"content": "CWE Code: 281\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Preservation of Permissions\nSummary: a kernel-mode driver in microsoft windows xp sp3, windows xp x64 xp2, windows server 2003 sp2, windows vista, windows 7 sp1, windows server 2008 sp2 and r2 sp1, and windows 8 allows an elevation of privilege when it fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability\". this cve is unique from cve-2017-0263.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-06-15\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in index.php in dreamlevels dreampoll 3.1 allow remote attackers to execute arbitrary sql commands via the (1) sortfield, (2) sortdesc, or (3) pagenumber parameter in a login action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-03-26
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in dreamlevels dreampoll 3.1 allow remote attackers to execute arbitrary sql commands via the (1) sortfield, (2) sortdesc, or (3) pagenumber parameter in a login action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-26\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: the sockets subsystem in android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application that uses (1) the af_msm_ipc socket class or (2) another socket class that is unrecognized by selinux, aka internal bug 28612709.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-07-11
Last Modified Date: 2016-07-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: the sockets subsystem in android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application that uses (1) the af_msm_ipc socket class or (2) another socket class that is unrecognized by selinux, aka internal bug 28612709.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-11\nLast Modified Date: 2016-07-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in the buslicense (com_buslicense) component for joomla! allows remote attackers to execute arbitrary sql commands via the aid parameter in a list action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-02-05
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the buslicense (com_buslicense) component for joomla! allows remote attackers to execute arbitrary sql commands via the aid parameter in a list action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-05\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in frontaccounting (fa) before 2.1.7 allow remote attackers to execute arbitrary sql commands via unspecified parameters to various .inc and .php files in (1) reporting/, (2) sales/, (3) sales/includes/, (4) sales/includes/db/, (5) sales/inquiry/, (6) sales/manage/, (7) sales/view/, (8) taxes/, and (9) taxes/db/.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-11-20
Last Modified Date: 2009-11-23 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in frontaccounting (fa) before 2.1.7 allow remote attackers to execute arbitrary sql commands via unspecified parameters to various .inc and .php files in (1) reporting/, (2) sales/, (3) sales/includes/, (4) sales/includes/db/, (5) sales/inquiry/, (6) sales/manage/, (7) sales/view/, (8) taxes/, and (9) taxes/db/.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-11-20\nLast Modified Date: 2009-11-23",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the (1) mdsys.sdo_geom_trig_ins1 and (2) mdsys.sdo_lrs_trig_ins default triggers in oracle 9i and 10g allows remote attackers to execute arbitrary sql commands via the new.table_name or new.column_name parameters.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2004-12-23
Last Modified Date: 2017-07-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the (1) mdsys.sdo_geom_trig_ins1 and (2) mdsys.sdo_lrs_trig_ins default triggers in oracle 9i and 10g allows remote attackers to execute arbitrary sql commands via the new.table_name or new.column_name parameters.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2004-12-23\nLast Modified Date: 2017-07-11",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: hp event correlation service (ecsd) as included with openview network node manager 6.1 allows a remote attacker to gain addition privileges via a buffer overflow attack in the '-restore_config' command line parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2001-08-14
Last Modified Date: 2017-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: hp event correlation service (ecsd) as included with openview network node manager 6.1 allows a remote attacker to gain addition privileges via a buffer overflow attack in the '-restore_config' command line parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2001-08-14\nLast Modified Date: 2017-10-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in login.php in simple document management system (sdms) 1.1.5 and 1.1.4, and possibly earlier, allows remote attackers to execute arbitrary sql commands via the pass parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-20
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in login.php in simple document management system (sdms) 1.1.5 and 1.1.4, and possibly earlier, allows remote attackers to execute arbitrary sql commands via the pass parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-20\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in alstrasoft web email script enterprise (ese) allows remote attackers to execute arbitrary sql commands via the id parameter in a directory action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-12-30
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in alstrasoft web email script enterprise (ese) allows remote attackers to execute arbitrary sql commands via the id parameter in a directory action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-30\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in etouch samepage enterprise edition 4.4.0.0.239 allows remote attackers to execute arbitrary sql commands via the catid parameter to cm/blogrss/feed.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-02-24
Last Modified Date: 2016-11-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in etouch samepage enterprise edition 4.4.0.0.239 allows remote attackers to execute arbitrary sql commands via the catid parameter to cm/blogrss/feed.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-02-24\nLast Modified Date: 2016-11-30",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: sql_injection
CVSS Score: 4.3
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: multiple cross-site scripting (xss) vulnerabilities in phpmyadmin 2.11.x before 2.11.10.1 and 3.x before 3.3.5.1 allow remote attackers to inject arbitrary web script or html via vectors related to (1) db_search.php, (2) db_sql.php, (3) db_structure.php, (4) js/messages.php, (5) libraries/common.lib.php, (6) libraries/database_interface.lib.php, (7) libraries/dbi/mysql.dbi.lib.php, (8) libraries/dbi/mysqli.dbi.lib.php, (9) libraries/db_info.inc.php, (10) libraries/sanitizing.lib.php, (11) libraries/sqlparser.lib.php, (12) server_databases.php, (13) server_privileges.php, (14) setup/config.php, (15) sql.php, (16) tbl_replace.php, and (17) tbl_sql.php.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2010-08-24
Last Modified Date: 2011-01-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: sql_injection\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: multiple cross-site scripting (xss) vulnerabilities in phpmyadmin 2.11.x before 2.11.10.1 and 3.x before 3.3.5.1 allow remote attackers to inject arbitrary web script or html via vectors related to (1) db_search.php, (2) db_sql.php, (3) db_structure.php, (4) js/messages.php, (5) libraries/common.lib.php, (6) libraries/database_interface.lib.php, (7) libraries/dbi/mysql.dbi.lib.php, (8) libraries/dbi/mysqli.dbi.lib.php, (9) libraries/db_info.inc.php, (10) libraries/sanitizing.lib.php, (11) libraries/sqlparser.lib.php, (12) server_databases.php, (13) server_privileges.php, (14) setup/config.php, (15) sql.php, (16) tbl_replace.php, and (17) tbl_sql.php.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2010-08-24\nLast Modified Date: 2011-01-28",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 4.7
CWE Name: Information Exposure
Summary: unspecified vulnerability in the dynamic tracing framework (dtrace) in sun solaris 10 allows local users with priv_dtrace_user or priv_dtrace_proc privileges to obtain sensitive kernel information via unspecified vectors, a different vulnerability than cve-2007-4126.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/NONE/NONE
Published Date: 2008-02-25
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.7\nCWE Name: Information Exposure\nSummary: unspecified vulnerability in the dynamic tracing framework (dtrace) in sun solaris 10 allows local users with priv_dtrace_user or priv_dtrace_proc privileges to obtain sensitive kernel information via unspecified vectors, a different vulnerability than cve-2007-4126.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/NONE/NONE\nPublished Date: 2008-02-25\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an issue was discovered in certain apple products. macos before 10.13.1 is affected. the issue involves the "remote management" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-11-13
Last Modified Date: 2017-11-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. macos before 10.13.1 is affected. the issue involves the \"remote management\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-11-13\nLast Modified Date: 2017-11-27",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: drivers/media/platform/msm/camera_v2/sensor/csid/msm_csid.c in the qualcomm camera driver in android before 2016-10-05 on nexus 5, nexus 5x, nexus 6, nexus 6p, and android one devices allows attackers to gain privileges via a crafted application, aka android internal bug 29513227 and qualcomm internal bug cr 1040857.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-10-10
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: drivers/media/platform/msm/camera_v2/sensor/csid/msm_csid.c in the qualcomm camera driver in android before 2016-10-05 on nexus 5, nexus 5x, nexus 6, nexus 6p, and android one devices allows attackers to gain privileges via a crafted application, aka android internal bug 29513227 and qualcomm internal bug cr 1040857.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-10-10\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: a sql injection vulnerability in the webui component of ip office contact center could allow an authenticated attacker to retrieve or alter sensitive data related to other users on the system. affected versions of ip office contact center include all 9.x and 10.x versions prior to 10.1.2.2.2-11201.1908. unsupported versions not listed here were not evaluated.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-04-04
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection vulnerability in the webui component of ip office contact center could allow an authenticated attacker to retrieve or alter sensitive data related to other users on the system. affected versions of ip office contact center include all 9.x and 10.x versions prior to 10.1.2.2.2-11201.1908. unsupported versions not listed here were not evaluated.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-04-04\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 78
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary: gig technology nv jumpscale portal 7 version before commit 15443122ed2b1cbfd7bdefc048bf106f075becdb contains a cwe-78: improper neutralization of special elements used in an os command ('os command injection') vulnerability in method: notifyspacemodification; that can result in improper validation of parameters results in command execution. this attack appear to be exploitable via network connectivity, required minimal auth privileges (everyone can register an account). this vulnerability appears to have been fixed in after commit 15443122ed2b1cbfd7bdefc048bf106f075becdb.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-09-06
Last Modified Date: 2019-03-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: gig technology nv jumpscale portal 7 version before commit 15443122ed2b1cbfd7bdefc048bf106f075becdb contains a cwe-78: improper neutralization of special elements used in an os command ('os command injection') vulnerability in method: notifyspacemodification; that can result in improper validation of parameters results in command execution. this attack appear to be exploitable via network connectivity, required minimal auth privileges (everyone can register an account). this vulnerability appears to have been fixed in after commit 15443122ed2b1cbfd7bdefc048bf106f075becdb.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-09-06\nLast Modified Date: 2019-03-07",
"role": "assistant"
}
] |
CWE Code: 665
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Improper Initialization
Summary: in libxaac there is a possible information disclosure due to uninitialized data. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-118492282
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-27
Last Modified Date: 2019-09-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Initialization.",
"role": "user"
},
{
"content": "CWE Code: 665\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Improper Initialization\nSummary: in libxaac there is a possible information disclosure due to uninitialized data. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-118492282\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in cyberbb 0.6 allow remote authenticated users to execute arbitrary sql commands via the (1) id parameter to show_topic.php and the (2) user parameter to profile.php.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-08-20
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in cyberbb 0.6 allow remote authenticated users to execute arbitrary sql commands via the (1) id parameter to show_topic.php and the (2) user parameter to profile.php.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-20\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: the kernel in microsoft windows 2000 sp4, xp sp2 and sp3, server 2003 sp2, vista gold, sp1, and sp2, and server 2008 sp2 does not properly validate user-mode pointers in unspecified error conditions, which allows local users to gain privileges via a crafted application, aka "windows kernel pointer validation vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2009-06-10
Last Modified Date: 2019-02-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: the kernel in microsoft windows 2000 sp4, xp sp2 and sp3, server 2003 sp2, vista gold, sp1, and sp2, and server 2008 sp2 does not properly validate user-mode pointers in unspecified error conditions, which allows local users to gain privileges via a crafted application, aka \"windows kernel pointer validation vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2009-06-10\nLast Modified Date: 2019-02-26",
"role": "assistant"
}
] |
CWE Code: 352
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Cross-Site Request Forgery (CSRF)
Summary: ibm security privileged identity manager virtual appliance 2.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. ibm x-force id: 144348.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-04-02
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF).",
"role": "user"
},
{
"content": "CWE Code: 352\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Cross-Site Request Forgery (CSRF)\nSummary: ibm security privileged identity manager virtual appliance 2.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. ibm x-force id: 144348.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-04-02\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the flash slideshow (slideshow) extension 0.2.2 for typo3 allows remote attackers to execute arbitrary sql commands via unknown vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-12-17
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the flash slideshow (slideshow) extension 0.2.2 for typo3 allows remote attackers to execute arbitrary sql commands via unknown vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-17\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in search.php in phcdownload 1.1.0 allows remote attackers to execute arbitrary sql commands via the string parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-01-08
Last Modified Date: 2008-11-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in search.php in phcdownload 1.1.0 allows remote attackers to execute arbitrary sql commands via the string parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-01-08\nLast Modified Date: 2008-11-15",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the "site browser > links pages" screen in dotcms before 3.3.1 allows remote authenticated attackers to execute arbitrary sql commands via the orderby parameter.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-11-14
Last Modified Date: 2016-11-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the \"site browser > links pages\" screen in dotcms before 3.3.1 allows remote authenticated attackers to execute arbitrary sql commands via the orderby parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-11-14\nLast Modified Date: 2016-11-29",
"role": "assistant"
}
] |
CWE Code: 522
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Insufficiently Protected Credentials
Summary: windows 10 version 1607 and windows server 2016 allow an elevation of privilege vulnerability due to how the multipoint management account password is stored, aka "windows elevation of privilege vulnerability".
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-02-15
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Insufficiently Protected Credentials.",
"role": "user"
},
{
"content": "CWE Code: 522\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Insufficiently Protected Credentials\nSummary: windows 10 version 1607 and windows server 2016 allow an elevation of privilege vulnerability due to how the multipoint management account password is stored, aka \"windows elevation of privilege vulnerability\".\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-02-15\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in mapbender 2.4.4 allow remote attackers to execute arbitrary sql commands via the gaz parameter to mod_gazetteer_edit.php and other unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-03-11
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in mapbender 2.4.4 allow remote attackers to execute arbitrary sql commands via the gaz parameter to mod_gazetteer_edit.php and other unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-03-11\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the yet-another-stars-rating plugin before 0.9.1 for wordpress has yasr_get_multi_set_values_and_field sql injection via the set_id parameter.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-10-10
Last Modified Date: 2019-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the yet-another-stars-rating plugin before 0.9.1 for wordpress has yasr_get_multi_set_values_and_field sql injection via the set_id parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-10-10\nLast Modified Date: 2019-10-15",
"role": "assistant"
}
] |
CWE Code: 755
Vulnerability Type: privilege_escalation
CVSS Score: 7.8
CWE Name: Improper Handling of Exceptional Conditions
Summary: in bitmap.ccp if bitmap.nativecreate fails an out of memory exception is not thrown leading to a java.io.ioexception later on. this could lead to a remote denial of service of a critical system process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 8.0, 8.1. android id: a-33846679.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2018-01-12
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Handling of Exceptional Conditions.",
"role": "user"
},
{
"content": "CWE Code: 755\nVulnerability Type: privilege_escalation\nCVSS Score: 7.8\nCWE Name: Improper Handling of Exceptional Conditions\nSummary: in bitmap.ccp if bitmap.nativecreate fails an out of memory exception is not thrown leading to a java.io.ioexception later on. this could lead to a remote denial of service of a critical system process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 8.0, 8.1. android id: a-33846679.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2018-01-12\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: an issue was discovered in phpmyadmin before 4.9.0.1. a vulnerability was reported where a specially crafted database name can be used to trigger an sql injection attack through the designer feature.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-06-05
Last Modified Date: 2019-06-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in phpmyadmin before 4.9.0.1. a vulnerability was reported where a specially crafted database name can be used to trigger an sql injection attack through the designer feature.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-06-05\nLast Modified Date: 2019-06-14",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Improper Privilege Management
Summary: in avast antivirus before v17, an unprivileged user (and thus malware or a virus) can mark an arbitrary process as trusted from the perspective of the avast product. this bypasses the self-defense feature of the product, opening a door to subsequent attack on many of its components.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2017-04-27
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Improper Privilege Management\nSummary: in avast antivirus before v17, an unprivileged user (and thus malware or a virus) can mark an arbitrary process as trusted from the perspective of the avast product. this bypasses the self-defense feature of the product, opening a door to subsequent attack on many of its components.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2017-04-27\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in pivotal cloud foundry (pcf) before 238; uaa 2.x before 2.7.4.4, 3.x before 3.3.0.2, and 3.4.x before 3.4.1; uaa bosh before 11.2 and 12.x before 12.2; elastic runtime before 1.6.29 and 1.7.x before 1.7.7; and ops manager 1.7.x before 1.7.8 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-04-11
Last Modified Date: 2017-04-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in pivotal cloud foundry (pcf) before 238; uaa 2.x before 2.7.4.4, 3.x before 3.3.0.2, and 3.4.x before 3.4.1; uaa bosh before 11.2 and 12.x before 12.2; elastic runtime before 1.6.29 and 1.7.x before 1.7.7; and ops manager 1.7.x before 1.7.8 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-04-11\nLast Modified Date: 2017-04-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 5.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: an issue was discovered in librenms 1.50.1. a sql injection flaw was identified in the ajax_rulesuggest.php file where the term parameter is used insecurely in a database query for showing columns of a table, as demonstrated by an ajax_rulesuggest.php?debug=1&term= request.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/NONE
Published Date: 2019-09-09
Last Modified Date: 2019-09-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in librenms 1.50.1. a sql injection flaw was identified in the ajax_rulesuggest.php file where the term parameter is used insecurely in a database query for showing columns of a table, as demonstrated by an ajax_rulesuggest.php?debug=1&term= request.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2019-09-09\nLast Modified Date: 2019-09-10",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Out-of-bounds Read
Summary: in libxaac, there is a possible out of bounds read due to a missing bounds check. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112768568
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-27
Last Modified Date: 2019-10-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Out-of-bounds Read\nSummary: in libxaac, there is a possible out of bounds read due to a missing bounds check. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112768568\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-01",
"role": "assistant"
}
] |
CWE Code: 281
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Improper Preservation of Permissions
Summary: graphics in microsoft windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "microsoft graphics component elevation of privilege vulnerability". this cve id is unique from cve-2017-8573 and cve-2017-8574.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-07-11
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Preservation of Permissions.",
"role": "user"
},
{
"content": "CWE Code: 281\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Improper Preservation of Permissions\nSummary: graphics in microsoft windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka \"microsoft graphics component elevation of privilege vulnerability\". this cve id is unique from cve-2017-8573 and cve-2017-8574.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-07-11\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in crumbs.php in ktools photostore 3.4.3 and 3.5.2 allows remote attackers to execute arbitrary sql commands via the gid parameter to about_us.php. note: this might be the same issue as cve-2008-6647.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-04-07
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in crumbs.php in ktools photostore 3.4.3 and 3.5.2 allows remote attackers to execute arbitrary sql commands via the gid parameter to about_us.php. note: this might be the same issue as cve-2008-6647.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-04-07\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: a vulnerability in the quality of service (qos) subsystem of cisco ios software and cisco ios xe software could allow an unauthenticated, remote attacker to cause a denial of service (dos) condition or execute arbitrary code with elevated privileges. the vulnerability is due to incorrect bounds checking of certain values in packets that are destined for udp port 18999 of an affected device. an attacker could exploit this vulnerability by sending malicious packets to an affected device. when the packets are processed, an exploitable buffer overflow condition may occur. a successful exploit could allow the attacker to execute arbitrary code on the affected device with elevated privileges. the attacker could also leverage this vulnerability to cause the device to reload, causing a temporary dos condition while the device is reloading. the malicious packets must be destined to and processed by an affected device. traffic transiting a device will not trigger the vulnerability. cisco bug ids: cscvf73881.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-03-28
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: a vulnerability in the quality of service (qos) subsystem of cisco ios software and cisco ios xe software could allow an unauthenticated, remote attacker to cause a denial of service (dos) condition or execute arbitrary code with elevated privileges. the vulnerability is due to incorrect bounds checking of certain values in packets that are destined for udp port 18999 of an affected device. an attacker could exploit this vulnerability by sending malicious packets to an affected device. when the packets are processed, an exploitable buffer overflow condition may occur. a successful exploit could allow the attacker to execute arbitrary code on the affected device with elevated privileges. the attacker could also leverage this vulnerability to cause the device to reload, causing a temporary dos condition while the device is reloading. the malicious packets must be destined to and processed by an affected device. traffic transiting a device will not trigger the vulnerability. cisco bug ids: cscvf73881.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-03-28\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the wp-olivecart versions prior to 3.1.3 and wp-olivecartpro versions prior to 3.1.8 allows attackers with administrator rights to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-05-22
Last Modified Date: 2017-05-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the wp-olivecart versions prior to 3.1.3 and wp-olivecartpro versions prior to 3.1.8 allows attackers with administrator rights to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-05-22\nLast Modified Date: 2017-05-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in the com_content component in miacms 4.6.5 allow remote attackers to execute arbitrary sql commands via the id parameter in a (1) view, (2) category, or (3) blogsection action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-08-26
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the com_content component in miacms 4.6.5 allow remote attackers to execute arbitrary sql commands via the id parameter in a (1) view, (2) category, or (3) blogsection action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-26\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in active_appointments.asp in asp inline corporate calendar allows remote attackers to execute arbitrary sql commands via the sortby parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-06-27
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in active_appointments.asp in asp inline corporate calendar allows remote attackers to execute arbitrary sql commands via the sortby parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-06-27\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Information Exposure
Summary: an information disclosure vulnerability in qualcomm components including the gpu driver, power driver, smsm point-to-point driver, and sound driver in android before 2016-11-05 could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. android id: a-31498159. references: qualcomm qc-cr#987051.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2016-11-25
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Information Exposure\nSummary: an information disclosure vulnerability in qualcomm components including the gpu driver, power driver, smsm point-to-point driver, and sound driver in android before 2016-11-05 could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. android id: a-31498159. references: qualcomm qc-cr#987051.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2016-11-25\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in tornadostore 1.4.3 and earlier allow remote attackers to execute arbitrary sql commands via (1) the marca parameter to precios.php3 or (2) the where parameter in a delivery_courier action to control/abm_list.php3.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-07-06
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in tornadostore 1.4.3 and earlier allow remote attackers to execute arbitrary sql commands via (1) the marca parameter to precios.php3 or (2) the where parameter in a delivery_courier action to control/abm_list.php3.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-07-06\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: hoteldruid before v2.3.1 has sql injection via the /visualizza_tabelle.php anno parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-06-07
Last Modified Date: 2019-07-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: hoteldruid before v2.3.1 has sql injection via the /visualizza_tabelle.php anno parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-06-07\nLast Modified Date: 2019-07-01",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in gamecms lite 1.0 allows remote attackers to execute arbitrary sql commands via the systemid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-05-14
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in gamecms lite 1.0 allows remote attackers to execute arbitrary sql commands via the systemid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-14\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Input Validation
Summary: the mm-video-v4l2 vidc component in mediaserver in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 does not validate certain omx parameter data structures, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining signature or signatureorsystem access, aka internal bug 27532721.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-06-13
Last Modified Date: 2016-06-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Input Validation\nSummary: the mm-video-v4l2 vidc component in mediaserver in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 does not validate certain omx parameter data structures, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining signature or signatureorsystem access, aka internal bug 27532721.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-06-13\nLast Modified Date: 2016-06-13",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: zoho manageengine applications manager 13 before build 13530 allows sql injection via the /mypage.do?method=viewdashboard forpage parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-11-16
Last Modified Date: 2018-08-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: zoho manageengine applications manager 13 before build 13530 allows sql injection via the /mypage.do?method=viewdashboard forpage parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-11-16\nLast Modified Date: 2018-08-07",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Permissions Privileges and Access Controls
Summary: admin/adminaddeditdetails.php in business community script does not properly restrict access, which allows remote attackers to gain privileges and add administrators via a direct request.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-05-16
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: admin/adminaddeditdetails.php in business community script does not properly restrict access, which allows remote attackers to gain privileges and add administrators via a direct request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-05-16\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in workarea/contentratinggraph.aspx in ektron cms400.net 7.5.2 and earlier allows remote attackers to execute arbitrary sql commands via the res parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-11-18
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in workarea/contentratinggraph.aspx in ektron cms400.net 7.5.2 and earlier allows remote attackers to execute arbitrary sql commands via the res parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-11-18\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 22
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary: wordpress through 5.0.3 allows path traversal in wp_crop_image(). an attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2019-02-20
Last Modified Date: 2019-04-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal').",
"role": "user"
},
{
"content": "CWE Code: 22\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\nSummary: wordpress through 5.0.3 allows path traversal in wp_crop_image(). an attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-02-20\nLast Modified Date: 2019-04-25",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in server/widgetallocator.php in urulu 2.1 allows remote attackers to execute arbitrary sql commands via the connectionid parameter to index.php with (1) statprt/js/request or (2) dyn/js/request in the path_info.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-02-29
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in server/widgetallocator.php in urulu 2.1 allows remote attackers to execute arbitrary sql commands via the connectionid parameter to index.php with (1) statprt/js/request or (2) dyn/js/request in the path_info.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-29\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in usersettings.php in e107 0.7.13 and earlier allows remote authenticated users to execute arbitrary sql commands via the ue[] parameter.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-12-03
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in usersettings.php in e107 0.7.13 and earlier allows remote authenticated users to execute arbitrary sql commands via the ue[] parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-03\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.0
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the dj-artgallery (com_djartgallery) component 0.9.1 for joomla! allows remote authenticated users to execute arbitrary sql commands via the cid[] parameter in an edititem action to administrator/index.php.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-11-02
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the dj-artgallery (com_djartgallery) component 0.9.1 for joomla! allows remote authenticated users to execute arbitrary sql commands via the cid[] parameter in an edititem action to administrator/index.php.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-02\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in default.asp in shibby shop 2.2 and earlier allows remote attackers to execute arbitrary sql commands via the sayfa parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-06-26
Last Modified Date: 2017-10-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in default.asp in shibby shop 2.2 and earlier allows remote attackers to execute arbitrary sql commands via the sayfa parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-26\nLast Modified Date: 2017-10-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in browse.asp in schoolwires academic portal allows remote attackers to execute arbitrary sql commands via the c parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-02-22
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in browse.asp in schoolwires academic portal allows remote attackers to execute arbitrary sql commands via the c parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-22\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: a vulnerability in the web framework code of cisco prime license manager (plm) could allow an unauthenticated, remote attacker to execute arbitrary sql queries. the vulnerability is due to a lack of proper validation of user-supplied input in sql queries. an attacker could exploit this vulnerability by sending crafted http post requests that contain malicious sql statements to an affected application. a successful exploit could allow the attacker to modify and delete arbitrary data in the plm database or gain shell access with the privileges of the postgres user.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-11-28
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a vulnerability in the web framework code of cisco prime license manager (plm) could allow an unauthenticated, remote attacker to execute arbitrary sql queries. the vulnerability is due to a lack of proper validation of user-supplied input in sql queries. an attacker could exploit this vulnerability by sending crafted http post requests that contain malicious sql statements to an affected application. a successful exploit could allow the attacker to modify and delete arbitrary data in the plm database or gain shell access with the privileges of the postgres user.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-11-28\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 4.4
CWE Name: Improper Input Validation
Summary: untrusted search path vulnerability in autodesk autocad before 2014 allows local users to gain privileges via a trojan horse dll in the current working directory.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-02-22
Last Modified Date: 2017-11-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Improper Input Validation\nSummary: untrusted search path vulnerability in autodesk autocad before 2014 allows local users to gain privileges via a trojan horse dll in the current working directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-02-22\nLast Modified Date: 2017-11-21",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the eluna page comments (eluna_pagecomments) extension 1.1.2 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-12-31
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the eluna page comments (eluna_pagecomments) extension 1.1.2 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-31\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in pics.php in availscript photo album allows remote attackers to execute arbitrary sql commands via the sid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-01
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in pics.php in availscript photo album allows remote attackers to execute arbitrary sql commands via the sid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-01\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the tour extension (pm_tour) extension before 0.0.13 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-03-15
Last Modified Date: 2010-03-16 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the tour extension (pm_tour) extension before 0.0.13 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-15\nLast Modified Date: 2010-03-16",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Improper Input Validation
Summary: improper flow control in crypto routines for intel(r) data center manager sdk before version 5.0.2 may allow a privileged user to potentially enable a denial of service via local access.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-02-18
Last Modified Date: 2019-02-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Input Validation\nSummary: improper flow control in crypto routines for intel(r) data center manager sdk before version 5.0.2 may allow a privileged user to potentially enable a denial of service via local access.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-02-18\nLast Modified Date: 2019-02-28",
"role": "assistant"
}
] |
CWE Code: 311
Vulnerability Type: sql_injection
CVSS Score: 5.0
CWE Name: Missing Encryption of Sensitive Data
Summary: the vmware content locker for ios prior to 4.14 contains a data protection vulnerability in the sqlite database. this vulnerability relates to unencrypted filenames and associated metadata in sqlite database for the content locker.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2018-09-11
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Missing Encryption of Sensitive Data.",
"role": "user"
},
{
"content": "CWE Code: 311\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Missing Encryption of Sensitive Data\nSummary: the vmware content locker for ios prior to 4.14 contains a data protection vulnerability in the sqlite database. this vulnerability relates to unencrypted filenames and associated metadata in sqlite database for the content locker.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-09-11\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Out-of-bounds Write
Summary: in libxaac there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-117216549
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-09-27
Last Modified Date: 2019-10-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Out-of-bounds Write\nSummary: in libxaac there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-117216549\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-01",
"role": "assistant"
}
] |
CWE Code: 399
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Resource Management Errors
Summary: fastfat.sys (aka the fastfat driver) in the kernel-mode drivers in microsoft windows server 2003 sp2, vista sp2, and server 2008 sp2 does not properly allocate memory, which allows physically proximate attackers to execute arbitrary code or cause a denial of service (reserved-memory write) by connecting a crafted usb device, aka "microsoft windows disk partition driver elevation of privilege vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-10-15
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Resource Management Errors.",
"role": "user"
},
{
"content": "CWE Code: 399\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Resource Management Errors\nSummary: fastfat.sys (aka the fastfat driver) in the kernel-mode drivers in microsoft windows server 2003 sp2, vista sp2, and server 2008 sp2 does not properly allocate memory, which allows physically proximate attackers to execute arbitrary code or cause a denial of service (reserved-memory write) by connecting a crafted usb device, aka \"microsoft windows disk partition driver elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-10-15\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Privilege Management
Summary: an issue was discovered in emc rsa identity governance and lifecycle versions 7.0.1, 7.0.2, all patch levels (hardware appliance and software bundle deployments only); rsa via lifecycle and governance version 7.0, all patch levels (hardware appliance and software bundle deployments only); rsa identity management & governance (rsa img) versions 6.9.0, 6.9.1, all patch levels (hardware appliance and software bundle deployments only). it allows certain os level users to execute arbitrary scripts with root level privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-03-08
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Privilege Management\nSummary: an issue was discovered in emc rsa identity governance and lifecycle versions 7.0.1, 7.0.2, all patch levels (hardware appliance and software bundle deployments only); rsa via lifecycle and governance version 7.0, all patch levels (hardware appliance and software bundle deployments only); rsa identity management & governance (rsa img) versions 6.9.0, 6.9.1, all patch levels (hardware appliance and software bundle deployments only). it allows certain os level users to execute arbitrary scripts with root level privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-03-08\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.6
CWE Name: Permissions Privileges and Access Controls
Summary: mac os x 10.3.9 and earlier allows users to install, create, and execute setuid/setgid scripts, contrary to the intended design, which may allow attackers to conduct unauthorized activities with escalated privileges via vulnerable scripts.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2005-05-02
Last Modified Date: 2009-10-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: mac os x 10.3.9 and earlier allows users to install, create, and execute setuid/setgid scripts, contrary to the intended design, which may allow attackers to conduct unauthorized activities with escalated privileges via vulnerable scripts.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2005-05-02\nLast Modified Date: 2009-10-14",
"role": "assistant"
}
] |
CWE Code: 732
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Incorrect Permission Assignment for Critical Resource
Summary: nvidia jetson tx2 contains a vulnerability in the kernel driver where input/output control (ioctl) handling for user mode requests could create a non-trusted pointer dereference, which may lead to information disclosure, denial of service, escalation of privileges, or code execution. the updates apply to all versions prior to r28.3.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-04-12
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.",
"role": "user"
},
{
"content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: nvidia jetson tx2 contains a vulnerability in the kernel driver where input/output control (ioctl) handling for user mode requests could create a non-trusted pointer dereference, which may lead to information disclosure, denial of service, escalation of privileges, or code execution. the updates apply to all versions prior to r28.3.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-04-12\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: knex.js versions before 0.19.5 are vulnerable to sql injection attack. identifiers are escaped incorrectly as part of the mssql dialect, allowing attackers to craft a malicious query to the host db.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-10-08
Last Modified Date: 2019-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: knex.js versions before 0.19.5 are vulnerable to sql injection attack. identifiers are escaped incorrectly as part of the mssql dialect, allowing attackers to craft a malicious query to the host db.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-10-08\nLast Modified Date: 2019-10-15",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in _rights.php in dynpg cms 4.2.0 allows remote attackers to execute arbitrary sql commands via the giverights_userid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-12-06
Last Modified Date: 2010-12-20 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in _rights.php in dynpg cms 4.2.0 allows remote attackers to execute arbitrary sql commands via the giverights_userid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-12-06\nLast Modified Date: 2010-12-20",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Information Exposure
Summary: the kernel in microsoft windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allows local users to gain privileges via a crafted application that makes an api call to access sensitive information in the registry, aka "windows kernel local elevation of privilege vulnerability," a different vulnerability than cve-2016-0073.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2016-10-14
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Information Exposure\nSummary: the kernel in microsoft windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allows local users to gain privileges via a crafted application that makes an api call to access sensitive information in the registry, aka \"windows kernel local elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0073.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2016-10-14\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in upload/index.php in rw::download 2.0.3 lite allow remote attackers to execute arbitrary sql commands via the (1) dlid or (2) cid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-09-12
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in upload/index.php in rw::download 2.0.3 lite allow remote attackers to execute arbitrary sql commands via the (1) dlid or (2) cid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-09-12\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: cross-site scripting (xss) vulnerability in the cck tablefield module 6.x before 6.x-1.2 for drupal allows remote authenticated users, with certain node creation or editing privileges, to inject arbitrary web script or html via table headers.
Access Authentication: SINGLE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2010-05-20
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: cross-site scripting (xss) vulnerability in the cck tablefield module 6.x before 6.x-1.2 for drupal allows remote authenticated users, with certain node creation or editing privileges, to inject arbitrary web script or html via table headers.\nAccess Authentication: SINGLE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2010-05-20\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in pages/index.php in basic-cms allows remote attackers to execute arbitrary sql commands via the page_id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-06-20
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in pages/index.php in basic-cms allows remote attackers to execute arbitrary sql commands via the page_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-20\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in register.asp in snitz forums 2000 before 3.4.03, and possibly 3.4.07 and earlier, allows remote attackers to execute arbitrary stored procedures via the email variable.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2003-06-16
Last Modified Date: 2017-07-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in register.asp in snitz forums 2000 before 3.4.03, and possibly 3.4.07 and earlier, allows remote attackers to execute arbitrary stored procedures via the email variable.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2003-06-16\nLast Modified Date: 2017-07-11",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 6.6
CWE Name: Improper Input Validation
Summary: qemu-kvm, as used in the hypervisor (aka rhev-hypervisor) in red hat enterprise virtualization (rhev) 2.2 and kvm 83, does not properly validate guest qxl driver pointers, which allows guest os users to cause a denial of service (invalid pointer dereference and guest os crash) or possibly gain privileges via unspecified vectors.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-08-24
Last Modified Date: 2010-08-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.6\nCWE Name: Improper Input Validation\nSummary: qemu-kvm, as used in the hypervisor (aka rhev-hypervisor) in red hat enterprise virtualization (rhev) 2.2 and kvm 83, does not properly validate guest qxl driver pointers, which allows guest os users to cause a denial of service (invalid pointer dereference and guest os crash) or possibly gain privileges via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-08-24\nLast Modified Date: 2010-08-25",
"role": "assistant"
}
] |
CWE Code: 78
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability. nexus 3000 series switches are affected running software versions prior to 7.0(3)i4(9) and 7.0(3)i7(4). nexus 3500 platform switches are affected running software versions prior to 7.0(3)i7(4). nexus 3600 platform switches are affected running software versions prior to 7.0(3)f3(5). nexus 9000 series switches in stand are affected running software versions prior to 7.0(3)f3(5).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-03-11
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability. nexus 3000 series switches are affected running software versions prior to 7.0(3)i4(9) and 7.0(3)i7(4). nexus 3500 platform switches are affected running software versions prior to 7.0(3)i7(4). nexus 3600 platform switches are affected running software versions prior to 7.0(3)f3(5). nexus 9000 series switches in stand are affected running software versions prior to 7.0(3)f3(5).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-03-11\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in testlink 1.8.5b and earlier allow remote authenticated users with the requirement view permission to execute arbitrary sql commands via the req_spec_id parameter to (1) reqspecanalyse.php, (2) reqspecprint.php, or (3) reqspecview.php in requirements/. note: some of these details are obtained from third party information.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-08-14
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in testlink 1.8.5b and earlier allow remote authenticated users with the requirement view permission to execute arbitrary sql commands via the req_spec_id parameter to (1) reqspecanalyse.php, (2) reqspecprint.php, or (3) reqspecview.php in requirements/. note: some of these details are obtained from third party information.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-08-14\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 255
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Credentials Management
Summary: doorgets 7.0 has a default administrator credential vulnerability. a remote attacker can use this vulnerability to gain administrator privileges for the creation and modification of articles via an h0xzlt44fcn1j9ltdfc5xrxhlf30uage1g3czy6i1k9 access_token in a uri=blog&action=index&controller=blog action to /api/index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-04-30
Last Modified Date: 2019-05-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Credentials Management.",
"role": "user"
},
{
"content": "CWE Code: 255\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Credentials Management\nSummary: doorgets 7.0 has a default administrator credential vulnerability. a remote attacker can use this vulnerability to gain administrator privileges for the creation and modification of articles via an h0xzlt44fcn1j9ltdfc5xrxhlf30uage1g3czy6i1k9 access_token in a uri=blog&action=index&controller=blog action to /api/index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-04-30\nLast Modified Date: 2019-05-01",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: bluecms 1.6 allows sql injection via the user_name parameter to uploads/user.php?act=index_login.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-09-04
Last Modified Date: 2018-10-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: bluecms 1.6 allows sql injection via the user_name parameter to uploads/user.php?act=index_login.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-09-04\nLast Modified Date: 2018-10-25",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in soporte_horizontal_w.php in php webquest 2.6 allows remote attackers to execute arbitrary sql commands via the id_actividad parameter, a different vector than cve-2007-4920.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-01-10
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in soporte_horizontal_w.php in php webquest 2.6 allows remote attackers to execute arbitrary sql commands via the id_actividad parameter, a different vector than cve-2007-4920.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-01-10\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: vmstate_xhci_event in hw/usb/hcd-xhci.c in qemu 1.6.0 does not terminate the list with the vmstate_end_of_list macro, which allows attackers to cause a denial of service (out-of-bounds access, infinite loop, and memory corruption) and possibly gain privileges via unspecified vectors.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-08-26
Last Modified Date: 2014-11-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: vmstate_xhci_event in hw/usb/hcd-xhci.c in qemu 1.6.0 does not terminate the list with the vmstate_end_of_list macro, which allows attackers to cause a denial of service (out-of-bounds access, infinite loop, and memory corruption) and possibly gain privileges via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-08-26\nLast Modified Date: 2014-11-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in the administration web ui servlets in citrix command center before 5.1 build 36.7 and 5.2 before build 44.11 allow remote authenticated users to execute arbitrary sql commands via unspecified vectors.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-04-14
Last Modified Date: 2019-02-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the administration web ui servlets in citrix command center before 5.1 build 36.7 and 5.2 before build 44.11 allow remote authenticated users to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-04-14\nLast Modified Date: 2019-02-13",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sourcecodester hotel and lodge management system 1.0 is vulnerable to unauthenticated sql injection and can allow remote attackers to execute arbitrary sql commands via the id parameter to the edit page for customer, room, currency, room booking details, or tax details.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-10-23
Last Modified Date: 2019-10-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sourcecodester hotel and lodge management system 1.0 is vulnerable to unauthenticated sql injection and can allow remote attackers to execute arbitrary sql commands via the id parameter to the edit page for customer, room, currency, room booking details, or tax details.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-10-23\nLast Modified Date: 2019-10-28",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Improper Input Validation
Summary: g data internetsecurity 2007 does not properly validate certain parameters to system service descriptor table (ssdt) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via the (1) ntcreatekey and (2) ntopenprocess kernel ssdt hooks.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-09-24
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Input Validation\nSummary: g data internetsecurity 2007 does not properly validate certain parameters to system service descriptor table (ssdt) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via the (1) ntcreatekey and (2) ntopenprocess kernel ssdt hooks.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-09-24\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 94
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Improper Control of Generation of Code ('Code Injection')
Summary: vmware vcenter server appliance (vcsa) 5.1 before update 1 allows remote authenticated users to execute arbitrary programs with root privileges by leveraging virtual appliance management interface (vami) access.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-05-01
Last Modified Date: 2013-05-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Control of Generation of Code ('Code Injection').",
"role": "user"
},
{
"content": "CWE Code: 94\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Control of Generation of Code ('Code Injection')\nSummary: vmware vcenter server appliance (vcsa) 5.1 before update 1 allows remote authenticated users to execute arbitrary programs with root privileges by leveraging virtual appliance management interface (vami) access.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-05-01\nLast Modified Date: 2013-05-01",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the t3blog extension 0.6.2 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-03-02
Last Modified Date: 2010-03-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the t3blog extension 0.6.2 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-02\nLast Modified Date: 2010-03-03",
"role": "assistant"
}
] |
CWE Code: 732
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Incorrect Permission Assignment for Critical Resource
Summary: quest dr series disk backup software version before 4.0.3.1 allows privilege escalation (issue 3 of 6).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-06-02
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.",
"role": "user"
},
{
"content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: quest dr series disk backup software version before 4.0.3.1 allows privilege escalation (issue 3 of 6).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-06-02\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: cisco telepresence tc software 4.x and 5.x and te software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka bug id cscub67692.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-05-02
Last Modified Date: 2014-05-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: cisco telepresence tc software 4.x and 5.x and te software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka bug id cscub67692.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-05-02\nLast Modified Date: 2014-05-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in fusetalk 2.0 allows remote attackers to execute arbitrary sql commands via the ftvar_subcat (txforumid) parameter to forum/index.cfm and possibly other unspecified components, related to forum/include/error/forumerror.cfm.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-07-11
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in fusetalk 2.0 allows remote attackers to execute arbitrary sql commands via the ftvar_subcat (txforumid) parameter to forum/index.cfm and possibly other unspecified components, related to forum/include/error/forumerror.cfm.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-07-11\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 4.3
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: a vulnerability in the conferencing component of mitel mivoice connect, versions r1707-prem sp1 (21.84.5535.0) and earlier, and mitel st 14.2, versions ga27 (19.49.5200.0) and earlier, could allow an unauthenticated attacker to conduct an sql injection attack due to insufficient input validation for the signin interface. a successful exploit could allow an attacker to extract sensitive information from the database.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2018-04-25
Last Modified Date: 2018-05-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a vulnerability in the conferencing component of mitel mivoice connect, versions r1707-prem sp1 (21.84.5535.0) and earlier, and mitel st 14.2, versions ga27 (19.49.5200.0) and earlier, could allow an unauthenticated attacker to conduct an sql injection attack due to insufficient input validation for the signin interface. a successful exploit could allow an attacker to extract sensitive information from the database.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-04-25\nLast Modified Date: 2018-05-25",
"role": "assistant"
}
] |
CWE Code: 74
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Summary: without quotation marks, any whitespace in the file path for rockwell automation factorytalk activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. this may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. cvss v3 base score: 8.8, cvss vector string: (av:l/ac:l/pr:l/ui:n/s:c/c:h/i:h/a:h). rockwell automation has released a new version of factorytalk activation, version 4.01, which addresses the identified vulnerability. rockwell automation recommends upgrading to the latest version of factorytalk activation, version 4.01 or later.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-05-11
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection').",
"role": "user"
},
{
"content": "CWE Code: 74\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')\nSummary: without quotation marks, any whitespace in the file path for rockwell automation factorytalk activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. this may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. cvss v3 base score: 8.8, cvss vector string: (av:l/ac:l/pr:l/ui:n/s:c/c:h/i:h/a:h). rockwell automation has released a new version of factorytalk activation, version 4.01, which addresses the identified vulnerability. rockwell automation recommends upgrading to the latest version of factorytalk activation, version 4.01 or later.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-05-11\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 10.0
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in the web services web server in solarwinds storage resource monitor (srm) profiler (formerly storage manager (stm)) before 6.2.3 allow remote attackers to execute arbitrary sql commands via the (1) scriptschedule parameter in the scriptservlet servlet; the (2) wineventid or (3) wineventlog parameter in the windowseventlogsservlet servlet; the (4) processos parameter in the processesservlet servlet; the (5) group, (6) groupname, or (7) clientname parameter in the backupexceptionsservlet servlet; the (8) valdb or (9) valfs parameter in the backupassociationservlet servlet; the (10) orderby or (11) orderdir parameter in the hoststorageservlet servlet; the (12) filename, (13) sortfield, or (14) sortdirection parameter in the duplicatefilesservlet servlet; the (15) orderfld or (16) orderdir parameter in the quantummonitorservlet servlet; the (17) exitcode parameter in the nbuerrormessageservlet servlet; the (18) udfname, (19) displayname, (20) udfdescription, (21) udfdatavalue, (22) udfsectionname, or (23) udfid parameter in the userdefinedfieldconfigservlet servlet; the (24) sortfield or (25) sortdirection parameter in the xiotechmonitorservlet servlet; the (26) sortfield or (27) sortdirection parameter in the bexdriveusagesummaryservlet servlet; the (28) state parameter in the scriptservlet servlet; the (29) assignednames parameter in the fileactionassignmentservlet servlet; the (30) wineventsource parameter in the windowseventlogsservlet servlet; or the (31) name, (32) ipone, (33) iptwo, or (34) ipthree parameter in the xiotechmonitorservlet servlet.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-05-09
Last Modified Date: 2016-05-16 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 10.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the web services web server in solarwinds storage resource monitor (srm) profiler (formerly storage manager (stm)) before 6.2.3 allow remote attackers to execute arbitrary sql commands via the (1) scriptschedule parameter in the scriptservlet servlet; the (2) wineventid or (3) wineventlog parameter in the windowseventlogsservlet servlet; the (4) processos parameter in the processesservlet servlet; the (5) group, (6) groupname, or (7) clientname parameter in the backupexceptionsservlet servlet; the (8) valdb or (9) valfs parameter in the backupassociationservlet servlet; the (10) orderby or (11) orderdir parameter in the hoststorageservlet servlet; the (12) filename, (13) sortfield, or (14) sortdirection parameter in the duplicatefilesservlet servlet; the (15) orderfld or (16) orderdir parameter in the quantummonitorservlet servlet; the (17) exitcode parameter in the nbuerrormessageservlet servlet; the (18) udfname, (19) displayname, (20) udfdescription, (21) udfdatavalue, (22) udfsectionname, or (23) udfid parameter in the userdefinedfieldconfigservlet servlet; the (24) sortfield or (25) sortdirection parameter in the xiotechmonitorservlet servlet; the (26) sortfield or (27) sortdirection parameter in the bexdriveusagesummaryservlet servlet; the (28) state parameter in the scriptservlet servlet; the (29) assignednames parameter in the fileactionassignmentservlet servlet; the (30) wineventsource parameter in the windowseventlogsservlet servlet; or the (31) name, (32) ipone, (33) iptwo, or (34) ipthree parameter in the xiotechmonitorservlet servlet.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-05-09\nLast Modified Date: 2016-05-16",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: on samsung mobile devices with n(7.x) software, a buffer overflow in the vision service allows code execution in a privileged process via a large frame size, aka sve-2017-11165.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-03-30
Last Modified Date: 2018-04-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: on samsung mobile devices with n(7.x) software, a buffer overflow in the vision service allows code execution in a privileged process via a large frame size, aka sve-2017-11165.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-03-30\nLast Modified Date: 2018-04-19",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 4.9
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: it was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in rhel6 is thread-unsafe. so an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2019-04-11
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: it was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in rhel6 is thread-unsafe. so an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2019-04-11\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Out-of-bounds Read
Summary: in findsharedfunctioninfo of objects.cc, there is a possible out of bounds read due to a mistake in ast traversal. this could lead to remote code execution in the pacprocessor with no additional execution privileges needed. user interaction is not needed for exploitation.product: androidversions: android-9android id: a-138442295
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-13
Last Modified Date: 2019-11-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Out-of-bounds Read\nSummary: in findsharedfunctioninfo of objects.cc, there is a possible out of bounds read due to a mistake in ast traversal. this could lead to remote code execution in the pacprocessor with no additional execution privileges needed. user interaction is not needed for exploitation.product: androidversions: android-9android id: a-138442295\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-13\nLast Modified Date: 2019-11-13",
"role": "assistant"
}
] |
CWE Code: 415
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Double Free
Summary: race condition in drivers/tty/n_hdlc.c in the linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the hdlc line discipline.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-03-07
Last Modified Date: 2018-01-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Double Free.",
"role": "user"
},
{
"content": "CWE Code: 415\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Double Free\nSummary: race condition in drivers/tty/n_hdlc.c in the linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the hdlc line discipline.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-03-07\nLast Modified Date: 2018-01-05",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the ccinvoices (com_ccinvoices) component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a viewinv action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-10-05
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the ccinvoices (com_ccinvoices) component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a viewinv action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-10-05\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 4.9
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: race condition in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2, r2, and r2 sp1, and windows 7 gold and sp1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other cves listed in ms13-016.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/NONE/NONE
Published Date: 2013-02-13
Last Modified Date: 2019-02-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: race condition in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2, r2, and r2 sp1, and windows 7 gold and sp1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other cves listed in ms13-016.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/NONE/NONE\nPublished Date: 2013-02-13\nLast Modified Date: 2019-02-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in galeriashqip 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the album_id parameter. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-09-03
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in galeriashqip 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the album_id parameter. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-09-03\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.