text
stringlengths 365
3.97k
| conversations
listlengths 3
3
|
---|---|
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Untrusted Search Path
Summary: untrusted search path vulnerability in axpdfium v0.01 allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-06-26
Last Modified Date: 2018-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in axpdfium v0.01 allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-06-26\nLast Modified Date: 2018-08-17",
"role": "assistant"
}
] |
CWE Code: 281
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Improper Preservation of Permissions
Summary: graphics in microsoft windows 7 sp1, windows server 2008 sp2 and r2 sp1, windows 8.1 and windows rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "win32k elevation of privilege vulnerability".
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-07-11
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Preservation of Permissions.",
"role": "user"
},
{
"content": "CWE Code: 281\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Improper Preservation of Permissions\nSummary: graphics in microsoft windows 7 sp1, windows server 2008 sp2 and r2 sp1, windows 8.1 and windows rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka \"win32k elevation of privilege vulnerability\".\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-07-11\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Information Exposure
Summary: the windows gdi component in windows 7 sp1 and windows server 2008 sp2 and r2 sp1 allows an information disclosure vulnerability due to the way objects are handled in memory, aka "windows elevation of privilege vulnerability".
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2018-01-04
Last Modified Date: 2018-01-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Information Exposure\nSummary: the windows gdi component in windows 7 sp1 and windows server 2008 sp2 and r2 sp1 allows an information disclosure vulnerability due to the way objects are handled in memory, aka \"windows elevation of privilege vulnerability\".\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-01-04\nLast Modified Date: 2018-01-12",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 7.6
CWE Name: Improper Access Control
Summary: an elevation of privilege vulnerability in the qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31253255. references: qc-cr#1072166.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-01-12
Last Modified Date: 2017-01-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Improper Access Control\nSummary: an elevation of privilege vulnerability in the qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31253255. references: qc-cr#1072166.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-01-18",
"role": "assistant"
}
] |
CWE Code: 434
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Unrestricted Upload of File with Dangerous Type
Summary: ibm bigfix platform 9.5 could allow any authenticated user to upload any file to any location on the server with root privileges. this results in code execution on underlying system with root privileges. ibm x-force id: 155887.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-04-10
Last Modified Date: 2019-10-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Unrestricted Upload of File with Dangerous Type.",
"role": "user"
},
{
"content": "CWE Code: 434\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Unrestricted Upload of File with Dangerous Type\nSummary: ibm bigfix platform 9.5 could allow any authenticated user to upload any file to any location on the server with root privileges. this results in code execution on underlying system with root privileges. ibm x-force id: 155887.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-04-10\nLast Modified Date: 2019-10-07",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in includes/content/member_content.php in bandsite cms 1.1.4 allows remote attackers to execute arbitrary sql commands via the memid parameter to members.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-04-22
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in includes/content/member_content.php in bandsite cms 1.1.4 allows remote attackers to execute arbitrary sql commands via the memid parameter to members.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-04-22\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Untrusted Search Path
Summary: untrusted search path vulnerability in self-extracting archive files created by file compact ver.5 version 5.10 and earlier, ver.6 version 6.02 and earlier, ver.7 version 7.02 and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-07-17
Last Modified Date: 2018-02-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in self-extracting archive files created by file compact ver.5 version 5.10 and earlier, ver.6 version 6.02 and earlier, ver.7 version 7.02 and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-07-17\nLast Modified Date: 2018-02-17",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: stored xss vulnerability in flyspray before 1.0-rc6 allows an authenticated user to inject javascript to gain administrator privileges, via the real_name or email_address field to themes/cleanfs/templates/common.editallusers.tpl.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2017-10-11
Last Modified Date: 2017-10-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: stored xss vulnerability in flyspray before 1.0-rc6 allows an authenticated user to inject javascript to gain administrator privileges, via the real_name or email_address field to themes/cleanfs/templates/common.editallusers.tpl.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2017-10-11\nLast Modified Date: 2017-10-27",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in dell scriptlogic asset manager (aka quest workspace asset manager) before 9.5 allow remote attackers to execute arbitrary sql commands via unspecified vectors to (1) getclientpackage.aspx or (2) getprocessedpackage.aspx.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-02-24
Last Modified Date: 2015-02-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in dell scriptlogic asset manager (aka quest workspace asset manager) before 9.5 allow remote attackers to execute arbitrary sql commands via unspecified vectors to (1) getclientpackage.aspx or (2) getprocessedpackage.aspx.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-02-24\nLast Modified Date: 2015-02-25",
"role": "assistant"
}
] |
CWE Code: 287
Vulnerability Type: privilege_escalation
CVSS Score: 6.4
CWE Name: Improper Authentication
Summary: a vulnerability in the quality of voice reporting (qovr) service of cisco prime collaboration assurance (pca) software could allow an unauthenticated, remote attacker to access the system as a valid user. the vulnerability is due to insufficient authentication controls. an attacker could exploit this vulnerability by connecting to the qovr service with a valid username. a successful exploit could allow the attacker to perform actions with the privileges of the user that is used for access. this vulnerability affects cisco pca software releases prior to 12.1 sp2.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/NONE
Published Date: 2019-02-21
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Authentication.",
"role": "user"
},
{
"content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 6.4\nCWE Name: Improper Authentication\nSummary: a vulnerability in the quality of voice reporting (qovr) service of cisco prime collaboration assurance (pca) software could allow an unauthenticated, remote attacker to access the system as a valid user. the vulnerability is due to insufficient authentication controls. an attacker could exploit this vulnerability by connecting to the qovr service with a valid username. a successful exploit could allow the attacker to perform actions with the privileges of the user that is used for access. this vulnerability affects cisco pca software releases prior to 12.1 sp2.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2019-02-21\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Untrusted Search Path
Summary: untrusted search path vulnerability in self-extracting archive files created by iexpress bundled with microsoft windows allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-06-26
Last Modified Date: 2018-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in self-extracting archive files created by iexpress bundled with microsoft windows allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-06-26\nLast Modified Date: 2018-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: php scripts mall php multivendor ecommerce has sql injection via the shopping-cart.php cusid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-28
Last Modified Date: 2018-04-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: php scripts mall php multivendor ecommerce has sql injection via the shopping-cart.php cusid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-28\nLast Modified Date: 2018-04-13",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the process-initialization implementation in win32k.sys in the kernel-mode drivers in microsoft windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "win32k elevation of privilege vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-09-09
Last Modified Date: 2019-05-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the process-initialization implementation in win32k.sys in the kernel-mode drivers in microsoft windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-09-09\nLast Modified Date: 2019-05-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in include/functions_trackbacks.inc.php in serendipity 1.6.2 allows remote attackers to execute arbitrary sql commands via the url parameter to comment.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-06-07
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in include/functions_trackbacks.inc.php in serendipity 1.6.2 allows remote attackers to execute arbitrary sql commands via the url parameter to comment.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-06-07\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in sources/search.php in a-blog 2.0 allows remote attackers to execute arbitrary sql commands via the words parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-10-08
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in sources/search.php in a-blog 2.0 allows remote attackers to execute arbitrary sql commands via the words parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-10-08\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: libmedia in android before 5.1.1 lmy48x and 6.0 before 2015-11-01 allows attackers to gain privileges via a crafted application, aka internal bug 23540426.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-11-03
Last Modified Date: 2019-02-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: libmedia in android before 5.1.1 lmy48x and 6.0 before 2015-11-01 allows attackers to gain privileges via a crafted application, aka internal bug 23540426.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-11-03\nLast Modified Date: 2019-02-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection in the admin interface in tecnovision dlx spot player4 version >1.5.10 allows remote unauthenticated users to access the web interface as administrator via a crafted password.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-09-21
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection in the admin interface in tecnovision dlx spot player4 version >1.5.10 allows remote unauthenticated users to access the web interface as administrator via a crafted password.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-09-21\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in kb.php in omnistar live 5.2 and earlier allows remote attackers to execute arbitrary sql commands via the (1) id and (2) category_id parameter. note: due to a typo, an internet explorer issue was incorrectly assigned this identifier, but the correct identifier is cve-2005-3240.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2005-11-26
Last Modified Date: 2011-08-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in kb.php in omnistar live 5.2 and earlier allows remote attackers to execute arbitrary sql commands via the (1) id and (2) category_id parameter. note: due to a typo, an internet explorer issue was incorrectly assigned this identifier, but the correct identifier is cve-2005-3240.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2005-11-26\nLast Modified Date: 2011-08-05",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: a sql injection vulnerability in the softexpert (se) excellence suite 2.0 allows remote authenticated users to perform sql heuristics by pulling information from the database with the "cddocument" parameter in the "downloading electronic documents" section.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-07-09
Last Modified Date: 2018-09-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection vulnerability in the softexpert (se) excellence suite 2.0 allows remote authenticated users to perform sql heuristics by pulling information from the database with the \"cddocument\" parameter in the \"downloading electronic documents\" section.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-07-09\nLast Modified Date: 2018-09-05",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in directory.php in prozilla hosting index, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the cat_id parameter in a list action.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-05-05
Last Modified Date: 2018-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in directory.php in prozilla hosting index, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the cat_id parameter in a list action.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-05\nLast Modified Date: 2018-10-11",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the sys_amd64 iret handler in the kernel in freebsd 9.3 and 10.1 allows local users to gain privileges or cause a denial of service (kernel panic).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-10-10
Last Modified Date: 2018-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the sys_amd64 iret handler in the kernel in freebsd 9.3 and 10.1 allows local users to gain privileges or cause a denial of service (kernel panic).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-10-10\nLast Modified Date: 2018-10-09",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Permissions Privileges and Access Controls
Summary: cisco application policy infrastructure controller (apic) devices with software before 1.0(3o) and 1.1 before 1.1(1j) and nexus 9000 aci devices with software before 11.0(4o) and 11.1 before 11.1(1j) do not properly restrict access to the apic filesystem, which allows remote authenticated users to obtain root privileges via unspecified use of the apic cluster-management configuration feature, aka bug ids cscuu72094 and cscuv11991.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-07-24
Last Modified Date: 2017-09-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: cisco application policy infrastructure controller (apic) devices with software before 1.0(3o) and 1.1 before 1.1(1j) and nexus 9000 aci devices with software before 11.0(4o) and 11.1 before 11.1(1j) do not properly restrict access to the apic filesystem, which allows remote authenticated users to obtain root privileges via unspecified use of the apic cluster-management configuration feature, aka bug ids cscuu72094 and cscuv11991.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-07-24\nLast Modified Date: 2017-09-21",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Information Exposure
Summary: unspecified vulnerability in oracle mysql 5.7.14 and earlier allows remote authenticated users to affect confidentiality via vectors related to server: security: privileges.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2016-10-25
Last Modified Date: 2017-07-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Information Exposure\nSummary: unspecified vulnerability in oracle mysql 5.7.14 and earlier allows remote authenticated users to affect confidentiality via vectors related to server: security: privileges.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2016-10-25\nLast Modified Date: 2017-07-29",
"role": "assistant"
}
] |
CWE Code: 862
Vulnerability Type: privilege_escalation
CVSS Score: 8.5
CWE Name: Missing Authorization
Summary: a malicious user with unrestricted access to the appformix application management platform may be able to access a python debug console and execute system commands with root privilege. the appformix agent exposes the debug console on a host where appformix agent is executing. if the host is executing appformix agent, an attacker may access the debug console and execute python commands with root privilege. affected appformix releases are: all versions up to and including 2.7.3; 2.11 versions prior to 2.11.3; 2.15 versions prior to 2.15.2. juniper sirt is not aware of any malicious exploitation of this vulnerability, however, the issue has been seen in a production network. no other juniper networks products or platforms are affected by this issue.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-02-22
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Missing Authorization.",
"role": "user"
},
{
"content": "CWE Code: 862\nVulnerability Type: privilege_escalation\nCVSS Score: 8.5\nCWE Name: Missing Authorization\nSummary: a malicious user with unrestricted access to the appformix application management platform may be able to access a python debug console and execute system commands with root privilege. the appformix agent exposes the debug console on a host where appformix agent is executing. if the host is executing appformix agent, an attacker may access the debug console and execute python commands with root privilege. affected appformix releases are: all versions up to and including 2.7.3; 2.11 versions prior to 2.11.3; 2.15 versions prior to 2.15.2. juniper sirt is not aware of any malicious exploitation of this vulnerability, however, the issue has been seen in a production network. no other juniper networks products or platforms are affected by this issue.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-02-22\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: in magento prior to 1.9.4.3 and magento prior to 1.14.4.3, an authenticated user with limited administrative privileges can inject arbitrary javascript code into transactional email page when creating a new email template or editing existing email template.
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-06
Last Modified Date: 2019-11-06 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: in magento prior to 1.9.4.3 and magento prior to 1.14.4.3, an authenticated user with limited administrative privileges can inject arbitrary javascript code into transactional email page when creating a new email template or editing existing email template.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-06\nLast Modified Date: 2019-11-06",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Permissions Privileges and Access Controls
Summary: ibm db2 9.7 before fp3 does not properly enforce privilege requirements for execution of entries in the dynamic sql cache, which allows remote authenticated users to bypass intended access restrictions by leveraging the cache to execute an update statement contained in a compiled compound sql statement.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2010-09-20
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: ibm db2 9.7 before fp3 does not properly enforce privilege requirements for execution of entries in the dynamic sql cache, which allows remote authenticated users to bypass intended access restrictions by leveraging the cache to execute an update statement contained in a compiled compound sql statement.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2010-09-20\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Out-of-bounds Write
Summary: in libxaac, there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112610994
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-09-27
Last Modified Date: 2019-10-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Out-of-bounds Write\nSummary: in libxaac, there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112610994\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-01",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Permissions Privileges and Access Controls
Summary: multiple unspecified vulnerabilities in ibm hardware management console (hmc) 7 r3.2.0 allow attackers to gain privileges via "some hmc commands."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-12-10
Last Modified Date: 2011-03-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: multiple unspecified vulnerabilities in ibm hardware management console (hmc) 7 r3.2.0 allow attackers to gain privileges via \"some hmc commands.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-12-10\nLast Modified Date: 2011-03-08",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Improper Input Validation
Summary: an issue was discovered in mindoc through v1.0.2. it allows attackers to gain privileges by uploading an image file with contents that represent an admin session, and then sending a cookie: header with a mindoc_id value containing the relative pathname of this uploaded file. for example, the mindoc_id (aka session id) could be of the form aa/../../uploads/blog/201811/attach_#.jpg where '#' is a hex value displayed in the upload field of a manage/blogs/edit/ screen.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-11-08
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Input Validation\nSummary: an issue was discovered in mindoc through v1.0.2. it allows attackers to gain privileges by uploading an image file with contents that represent an admin session, and then sending a cookie: header with a mindoc_id value containing the relative pathname of this uploaded file. for example, the mindoc_id (aka session id) could be of the form aa/../../uploads/blog/201811/attach_#.jpg where '#' is a hex value displayed in the upload field of a manage/blogs/edit/ screen.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-11-08\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in cource.php in alefmentor 2.0 and 2.2 allow remote attackers to execute arbitrary sql commands via the (1) cont_id and (2) courc_id parameters in a pregled action. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-12-10
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in cource.php in alefmentor 2.0 and 2.2 allow remote attackers to execute arbitrary sql commands via the (1) cont_id and (2) courc_id parameters in a pregled action. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-10\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 4.9
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: in download provider, there is a possible sql injection vulnerability. this could lead to local information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation.product: androidversions: android-8.0 android-8.1 android-9 android-10android id: a-135270103
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-13
Last Modified Date: 2019-11-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 4.9\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: in download provider, there is a possible sql injection vulnerability. this could lead to local information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation.product: androidversions: android-8.0 android-8.1 android-9 android-10android id: a-135270103\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-13\nLast Modified Date: 2019-11-13",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the mailto (aka com_mailto) component in joomla! allows remote attackers to execute arbitrary sql commands via the article parameter in index.php. note: securityfocus states that this issue has been disputed by the vendor.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-05-01
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the mailto (aka com_mailto) component in joomla! allows remote attackers to execute arbitrary sql commands via the article parameter in index.php. note: securityfocus states that this issue has been disputed by the vendor.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-05-01\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: cross-site scripting (xss) vulnerability in the submitted by module 6.x before 6.x-1.3 for drupal allows remote authenticated users, with "administer content types" privileges, to inject arbitrary web script or html via an input string for "submitted by" text.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2010-01-04
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: cross-site scripting (xss) vulnerability in the submitted by module 6.x before 6.x-1.3 for drupal allows remote authenticated users, with \"administer content types\" privileges, to inject arbitrary web script or html via an input string for \"submitted by\" text.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2010-01-04\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 5.0
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in netapp oncommand unified manager core package 5.x before 5.2.2p1 allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2017-05-26
Last Modified Date: 2017-06-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in netapp oncommand unified manager core package 5.x before 5.2.2p1 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-05-26\nLast Modified Date: 2017-06-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in cisco webex meetings server 2.6 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscuy83200.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-07-15
Last Modified Date: 2017-09-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in cisco webex meetings server 2.6 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscuy83200.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-07-15\nLast Modified Date: 2017-09-01",
"role": "assistant"
}
] |
CWE Code: 276
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Incorrect Default Permissions
Summary: improper permissions in the installer for the nuvoton* cir driver versions 1.02.1002 and before may allow an authenticated user to potentially enable escalation of privilege via local access.
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-14
Last Modified Date: 2019-11-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Default Permissions.",
"role": "user"
},
{
"content": "CWE Code: 276\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Incorrect Default Permissions\nSummary: improper permissions in the installer for the nuvoton* cir driver versions 1.02.1002 and before may allow an authenticated user to potentially enable escalation of privilege via local access.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-14\nLast Modified Date: 2019-11-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in phphoo3.php in phphoo3 4.3.9, 4.3.10, 4.4.8, and 5.2.6 allows remote attackers to execute arbitrary sql commands via the viewcat parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-07-21
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in phphoo3.php in phphoo3 4.3.9, 4.3.10, 4.4.8, and 5.2.6 allows remote attackers to execute arbitrary sql commands via the viewcat parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-07-21\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in login.php in mole group taxi map script (aka taxi calc dist script) allows remote attackers to execute arbitrary sql commands via the user field.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-03-18
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in login.php in mole group taxi map script (aka taxi calc dist script) allows remote attackers to execute arbitrary sql commands via the user field.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-18\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 276
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Incorrect Default Permissions
Summary: scanguard through 2019-11-12 on windows has insecure permissions for the installation directory, leading to privilege escalation via a trojan horse executable file.
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-14
Last Modified Date: 2019-11-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Default Permissions.",
"role": "user"
},
{
"content": "CWE Code: 276\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Incorrect Default Permissions\nSummary: scanguard through 2019-11-12 on windows has insecure permissions for the installation directory, leading to privilege escalation via a trojan horse executable file.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-14\nLast Modified Date: 2019-11-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in the amazoop awesom! (com_awesom) 0.3.2component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the listid parameter in a viewlist task.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-02-06
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the amazoop awesom! (com_awesom) 0.3.2component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the listid parameter in a viewlist task.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-06\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Improper Input Validation
Summary: cisco prime infrastructure 1.2 and 1.3 before 1.3.0.20-2, 1.4 before 1.4.0.45-2, and 2.0 before 2.0.0.0.294-2 allows remote authenticated users to execute arbitrary commands with root privileges via an unspecified url, aka bug id cscum71308.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-02-27
Last Modified Date: 2019-07-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Input Validation\nSummary: cisco prime infrastructure 1.2 and 1.3 before 1.3.0.20-2, 1.4 before 1.4.0.45-2, and 2.0 before 2.0.0.0.294-2 allows remote authenticated users to execute arbitrary commands with root privileges via an unspecified url, aka bug id cscum71308.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-02-27\nLast Modified Date: 2019-07-29",
"role": "assistant"
}
] |
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Untrusted Search Path
Summary: untrusted search path vulnerability in installer of electronic reception and examination of application for radio licenses online 1.0.9.0 and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-05-17
Last Modified Date: 2019-05-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in installer of electronic reception and examination of application for radio licenses online 1.0.9.0 and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-05-17\nLast Modified Date: 2019-05-21",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in bidhistory.asp in active bids 3.5 allows remote attackers to execute arbitrary sql commands via the itemid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-12-17
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in bidhistory.asp in active bids 3.5 allows remote attackers to execute arbitrary sql commands via the itemid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-17\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka "microsoft sharepoint elevation of privilege vulnerability." this affects microsoft sharepoint server, microsoft sharepoint. this cve id is unique from cve-2018-8155, cve-2018-8156, cve-2018-8168.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2018-05-09
Last Modified Date: 2018-06-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft sharepoint server, microsoft sharepoint. this cve id is unique from cve-2018-8155, cve-2018-8156, cve-2018-8168.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2018-05-09\nLast Modified Date: 2018-06-05",
"role": "assistant"
}
] |
CWE Code: 94
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Control of Generation of Code ('Code Injection')
Summary: the garbage-collection implementation in mozilla firefox before 3.0.11, thunderbird before 2.0.0.22, and seamonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary javascript with chrome privileges via a crafted event handler, related to an incorrect context for this event handler.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2009-06-12
Last Modified Date: 2018-10-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Control of Generation of Code ('Code Injection').",
"role": "user"
},
{
"content": "CWE Code: 94\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Control of Generation of Code ('Code Injection')\nSummary: the garbage-collection implementation in mozilla firefox before 3.0.11, thunderbird before 2.0.0.22, and seamonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary javascript with chrome privileges via a crafted event handler, related to an incorrect context for this event handler.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2009-06-12\nLast Modified Date: 2018-10-30",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 6.6
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: unspecified vulnerability in the nvapi support layer in the nvidia gpu graphics driver r340 before 341.92, r352 before 354.35, and r358 before 358.87 on windows allows local users to obtain sensitive information, cause a denial of service (crash), or possibly gain privileges via unknown vectors. note: this identifier was split from cve-2015-7869 per adt2 and adt3 due to different vulnerability types and affected versions.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/PARTIAL/COMPLETE
Published Date: 2015-11-24
Last Modified Date: 2019-02-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.6\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: unspecified vulnerability in the nvapi support layer in the nvidia gpu graphics driver r340 before 341.92, r352 before 354.35, and r358 before 358.87 on windows allows local users to obtain sensitive information, cause a denial of service (crash), or possibly gain privileges via unknown vectors. note: this identifier was split from cve-2015-7869 per adt2 and adt3 due to different vulnerability types and affected versions.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/PARTIAL/COMPLETE\nPublished Date: 2015-11-24\nLast Modified Date: 2019-02-14",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: drivers/media/platform/msm/camera_v2/sensor/io/msm_camera_cci_i2c.c in the qualcomm camera driver in android before 2016-10-05 on nexus 5, nexus 5x, nexus 6, nexus 6p, and android one devices relies on variable-length arrays, which allows attackers to gain privileges via a crafted application, aka android internal bug 30102557 and qualcomm internal bug cr 789704.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-10-10
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: drivers/media/platform/msm/camera_v2/sensor/io/msm_camera_cci_i2c.c in the qualcomm camera driver in android before 2016-10-05 on nexus 5, nexus 5x, nexus 6, nexus 6p, and android one devices relies on variable-length arrays, which allows attackers to gain privileges via a crafted application, aka android internal bug 30102557 and qualcomm internal bug cr 789704.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-10-10\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in print.php in the mytopics module for xoops allows remote attackers to execute arbitrary sql commands via the articleid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-02-21
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in print.php in the mytopics module for xoops allows remote attackers to execute arbitrary sql commands via the articleid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-21\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php of webchat 1.5 included in xoops 1.0 allows remote attackers to execute arbitrary sql commands via the roomid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2002-12-31
Last Modified Date: 2008-09-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php of webchat 1.5 included in xoops 1.0 allows remote attackers to execute arbitrary sql commands via the roomid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2002-12-31\nLast Modified Date: 2008-09-05",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in getin.php in webbdomain quiz 1.02 and earlier allows remote attackers to execute arbitrary sql commands via the username parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-04-06
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in getin.php in webbdomain quiz 1.02 and earlier allows remote attackers to execute arbitrary sql commands via the username parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-04-06\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: the epathobj::pprflattenrec function in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, and windows server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the pathrecord chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many flattenpath function calls, aka "win32k read av vulnerability."
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-05-24
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the epathobj::pprflattenrec function in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, and windows server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the pathrecord chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many flattenpath function calls, aka \"win32k read av vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-05-24\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 862
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Missing Authorization
Summary: an elevation of privilege vulnerability in the telephony component could enable a local malicious application to access capabilities outside of its permission levels. this issue is rated as moderate because it could be used to gain access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-33815946.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-04-07
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Missing Authorization.",
"role": "user"
},
{
"content": "CWE Code: 862\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Missing Authorization\nSummary: an elevation of privilege vulnerability in the telephony component could enable a local malicious application to access capabilities outside of its permission levels. this issue is rated as moderate because it could be used to gain access to elevated capabilities, which are not normally accessible to a third-party application. product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. android id: a-33815946.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-04-07\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: dne2000.sys in citrix deterministic network enhancer (dne) 2.21.7.233 through 3.21.7.17464, as used in (1) cisco vpn client, (2) blue coat winproxy, and (3) safenet softremote and highassurance remote, allows local users to gain privileges via a crafted dne_ioctl deviceiocontrol request to the \\.\dne device interface.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2008-11-18
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: dne2000.sys in citrix deterministic network enhancer (dne) 2.21.7.233 through 3.21.7.17464, as used in (1) cisco vpn client, (2) blue coat winproxy, and (3) safenet softremote and highassurance remote, allows local users to gain privileges via a crafted dne_ioctl deviceiocontrol request to the \\\\.\\dne device interface.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2008-11-18\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: rsa web threat detection versions prior to 6.4, contain an sql injection vulnerability in the administration and forensics applications. an authenticated malicious user with low privileges could potentially exploit this vulnerability to execute sql commands on the back-end database to gain unauthorized access to the tool's monitoring and user information by supplying specially crafted input data to the affected application.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-06-05
Last Modified Date: 2019-07-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: rsa web threat detection versions prior to 6.4, contain an sql injection vulnerability in the administration and forensics applications. an authenticated malicious user with low privileges could potentially exploit this vulnerability to execute sql commands on the back-end database to gain unauthorized access to the tool's monitoring and user information by supplying specially crafted input data to the affected application.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-06-05\nLast Modified Date: 2019-07-15",
"role": "assistant"
}
] |
CWE Code: 191
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Integer Underflow (Wrap or Wraparound)
Summary: integer overflow in drivers/char/diag/diag_dci.c in the qualcomm components in android before 2016-08-05 on nexus 5 and 7 (2013) devices allows attackers to gain privileges or obtain sensitive information via a crafted application, aka android internal bug 28769912 and qualcomm internal bug cr565160.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-08-06
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Integer Underflow (Wrap or Wraparound).",
"role": "user"
},
{
"content": "CWE Code: 191\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Integer Underflow (Wrap or Wraparound)\nSummary: integer overflow in drivers/char/diag/diag_dci.c in the qualcomm components in android before 2016-08-05 on nexus 5 and 7 (2013) devices allows attackers to gain privileges or obtain sensitive information via a crafted application, aka android internal bug 28769912 and qualcomm internal bug cr565160.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-08-06\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in crafty syntax live help (cslh) 2.14.6 and earlier allow remote attackers to execute arbitrary sql commands via the department parameter to (1) is_xmlhttp.php and (2) is_flush.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-08-27
Last Modified Date: 2018-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in crafty syntax live help (cslh) 2.14.6 and earlier allow remote attackers to execute arbitrary sql commands via the department parameter to (1) is_xmlhttp.php and (2) is_flush.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-27\nLast Modified Date: 2018-10-11",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Permissions Privileges and Access Controls
Summary: improper access control in the intel(r) processor diagnostic tool before version 4.1.2.24 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-07-11
Last Modified Date: 2019-07-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: improper access control in the intel(r) processor diagnostic tool before version 4.1.2.24 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-11\nLast Modified Date: 2019-07-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in webnavigator in siemens wincc 7.0 sp3 and earlier, as used in simatic pcs7 and other products, allows remote attackers to execute arbitrary sql commands via a crafted soap message.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-09-18
Last Modified Date: 2012-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in webnavigator in siemens wincc 7.0 sp3 and earlier, as used in simatic pcs7 and other products, allows remote attackers to execute arbitrary sql commands via a crafted soap message.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-09-18\nLast Modified Date: 2012-09-19",
"role": "assistant"
}
] |
CWE Code: 476
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: NULL Pointer Dereference
Summary: the graphic acceleration functions in vmware tools 9.x and 10.x before 10.0.9 on os x allow local users to gain privileges or cause a denial of service (null pointer dereference) via unspecified vectors, a different vulnerability than cve-2016-7079.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-12-29
Last Modified Date: 2017-07-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: NULL Pointer Dereference.",
"role": "user"
},
{
"content": "CWE Code: 476\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: NULL Pointer Dereference\nSummary: the graphic acceleration functions in vmware tools 9.x and 10.x before 10.0.9 on os x allow local users to gain privileges or cause a denial of service (null pointer dereference) via unspecified vectors, a different vulnerability than cve-2016-7079.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-12-29\nLast Modified Date: 2017-07-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in zpanel 10.0.1 and earlier allows remote attackers to execute arbitrary sql commands via the inemailaddress parameter in an updateclient action in the manage_clients module to the default uri.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-08-14
Last Modified Date: 2014-08-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in zpanel 10.0.1 and earlier allows remote attackers to execute arbitrary sql commands via the inemailaddress parameter in an updateclient action in the manage_clients module to the default uri.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-08-14\nLast Modified Date: 2014-08-14",
"role": "assistant"
}
] |
CWE Code: 190
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Integer Overflow or Wraparound
Summary: in libaacdec, there is a possible out of bounds write due to an integer overflow. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112661610
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-09-27
Last Modified Date: 2019-09-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.",
"role": "user"
},
{
"content": "CWE Code: 190\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Integer Overflow or Wraparound\nSummary: in libaacdec, there is a possible out of bounds write due to an integer overflow. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112661610\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 8.3
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: a sql injection vulnerability in an trend micro email encryption gateway 5.5 search configuration script could allow an attacker to execute sql commands to upload and execute arbitrary code that may harm the target system.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-03-15
Last Modified Date: 2018-04-04 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 8.3\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection vulnerability in an trend micro email encryption gateway 5.5 search configuration script could allow an attacker to execute sql commands to upload and execute arbitrary code that may harm the target system.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-03-15\nLast Modified Date: 2018-04-04",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 5.5
CWE Name: Improper Input Validation
Summary: a denial of service vulnerability exists when microsoft hyper-v network switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka "windows hyper-v denial of service vulnerability." this affects windows 10, windows 10 servers. this cve id is unique from cve-2018-8436, cve-2018-8438.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2018-09-13
Last Modified Date: 2018-11-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Input Validation\nSummary: a denial of service vulnerability exists when microsoft hyper-v network switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka \"windows hyper-v denial of service vulnerability.\" this affects windows 10, windows 10 servers. this cve id is unique from cve-2018-8436, cve-2018-8438.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2018-09-13\nLast Modified Date: 2018-11-02",
"role": "assistant"
}
] |
CWE Code: 352
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Cross-Site Request Forgery (CSRF)
Summary: a vulnerability in the web-based management interface of cisco small business smart and managed switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (csrf) attack on an affected system. the vulnerability is due to insufficient csrf protections for the web-based management interface on an affected device. an attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. a successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. if the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (dos) condition on an affected device.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-10-16
Last Modified Date: 2019-10-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF).",
"role": "user"
},
{
"content": "CWE Code: 352\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Cross-Site Request Forgery (CSRF)\nSummary: a vulnerability in the web-based management interface of cisco small business smart and managed switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (csrf) attack on an affected system. the vulnerability is due to insufficient csrf protections for the web-based management interface on an affected device. an attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. a successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. if the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (dos) condition on an affected device.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-10-16\nLast Modified Date: 2019-10-22",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the (1) domainutility and (2) domainutilitycmd components in tibco domain utility in tibco runtime agent (tra) before 5.6.2, as used in tibco activematrix businessworks and other products, set weak permissions on domain properties files, which allows local users to obtain domain administrator credentials, and gain privileges on all domain systems, via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-01-14
Last Modified Date: 2011-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the (1) domainutility and (2) domainutilitycmd components in tibco domain utility in tibco runtime agent (tra) before 5.6.2, as used in tibco activematrix businessworks and other products, set weak permissions on domain properties files, which allows local users to obtain domain administrator credentials, and gain privileges on all domain systems, via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-01-14\nLast Modified Date: 2011-08-08",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the (1) ftpd and (2) ksu programs in (a) mit kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. note: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2006-08-09
Last Modified Date: 2018-10-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the (1) ftpd and (2) ksu programs in (a) mit kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. note: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2006-08-09\nLast Modified Date: 2018-10-18",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Permissions Privileges and Access Controls
Summary: red hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest os users to bypass intended access restrictions by leveraging ip address and source-port values, as demonstrated by copying and deleting an nfs directory tree.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2010-08-19
Last Modified Date: 2010-10-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Permissions Privileges and Access Controls\nSummary: red hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest os users to bypass intended access restrictions by leveraging ip address and source-port values, as demonstrated by copying and deleting an nfs directory tree.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2010-08-19\nLast Modified Date: 2010-10-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in ogp_show.php in esoftpro online guestbook pro 5.1 allows remote attackers to execute arbitrary sql commands via the search parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-11-01
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in ogp_show.php in esoftpro online guestbook pro 5.1 allows remote attackers to execute arbitrary sql commands via the search parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-01\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in feeds.php in injader before 2.1.2 allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-01-12
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in feeds.php in injader before 2.1.2 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-01-12\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Improper Privilege Management
Summary: an issue was discovered in ivanti workspace control before 10.3.10.0 and res one workspace. a local authenticated user can execute processes with elevated privileges via an unspecified attack vector.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-10-15
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Privilege Management\nSummary: an issue was discovered in ivanti workspace control before 10.3.10.0 and res one workspace. a local authenticated user can execute processes with elevated privileges via an unspecified attack vector.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-10-15\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in software-description.php in scripts for sites (sfs) hotscripts-like site allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-23
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in software-description.php in scripts for sites (sfs) hotscripts-like site allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-23\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an issue was discovered in certain apple products. ios before 10.3 is affected. macos before 10.12.4 is affected. the issue involves the "kernel" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-04-02
Last Modified Date: 2017-07-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 10.3 is affected. macos before 10.12.4 is affected. the issue involves the \"kernel\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-04-02\nLast Modified Date: 2017-07-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in results.php in the pyrmont plugin 2 for wordpress allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-12-28
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in results.php in the pyrmont plugin 2 for wordpress allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-28\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 2.6
CWE Name: Information Exposure
Summary: an information disclosure vulnerability in the mediatek driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: n/a. android id: a-31528890. references: mt-alps02961380.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2017-01-12
Last Modified Date: 2017-01-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.6\nCWE Name: Information Exposure\nSummary: an information disclosure vulnerability in the mediatek driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: n/a. android id: a-31528890. references: mt-alps02961380.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-01-18",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 5.7
CWE Name: Improper Access Control
Summary: xen, when used on a system providing pv backends, allows local guest os administrators to cause a denial of service (host os crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/COMPLETE
Published Date: 2016-04-14
Last Modified Date: 2017-11-04 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 5.7\nCWE Name: Improper Access Control\nSummary: xen, when used on a system providing pv backends, allows local guest os administrators to cause a denial of service (host os crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/COMPLETE\nPublished Date: 2016-04-14\nLast Modified Date: 2017-11-04",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in notas.asp in novus 1.0 allows remote attackers to execute arbitrary sql commands via the nota_id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-09-27
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in notas.asp in novus 1.0 allows remote attackers to execute arbitrary sql commands via the nota_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-09-27\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Permissions Privileges and Access Controls
Summary: the storm module 6.x before 6.x-1.25 for drupal does not enforce privilege requirements for storminvoiceitem nodes, which allows remote attackers to read node titles via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2009-12-31
Last Modified Date: 2010-01-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: the storm module 6.x before 6.x-1.25 for drupal does not enforce privilege requirements for storminvoiceitem nodes, which allows remote attackers to read node titles via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2009-12-31\nLast Modified Date: 2010-01-08",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Improper Privilege Management
Summary: pivotal operations manager, versions 2.0.x prior to 2.0.24, versions 2.1.x prior to 2.1.15, versions 2.2.x prior to 2.2.7, and versions 2.3.x prior to 2.3.1, grants all users a scope which allows for privilege escalation. a remote malicious user who has been authenticated may create a new client with administrator privileges for opsman.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-11-02
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Privilege Management\nSummary: pivotal operations manager, versions 2.0.x prior to 2.0.24, versions 2.1.x prior to 2.1.15, versions 2.2.x prior to 2.2.7, and versions 2.3.x prior to 2.3.1, grants all users a scope which allows for privilege escalation. a remote malicious user who has been authenticated may create a new client with administrator privileges for opsman.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-11-02\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in templates_export.php in cacti 0.8.7e and earlier allows remote attackers to execute arbitrary sql commands via the export_item_id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-05-04
Last Modified Date: 2012-02-16 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in templates_export.php in cacti 0.8.7e and earlier allows remote attackers to execute arbitrary sql commands via the export_item_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-05-04\nLast Modified Date: 2012-02-16",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: s-cms php 1.0 has sql injection in member/member_news.php via the type parameter (aka the $n_type field).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-11-01
Last Modified Date: 2018-12-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: s-cms php 1.0 has sql injection in member/member_news.php via the type parameter (aka the $n_type field).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-11-01\nLast Modified Date: 2018-12-08",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Permissions Privileges and Access Controls
Summary: a remote privilege elevation vulnerability in hpe matrix operating environment version 7.6 was found.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-02-15
Last Modified Date: 2018-03-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: a remote privilege elevation vulnerability in hpe matrix operating environment version 7.6 was found.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-02-15\nLast Modified Date: 2018-03-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection exists in the squadmanagement 1.0.3 component for joomla! via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-02-17
Last Modified Date: 2018-03-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in the squadmanagement 1.0.3 component for joomla! via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-02-17\nLast Modified Date: 2018-03-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in ibm algo one, as used in metadata management tools in uds 4.7.0 through 5.0.0, acsweb in algo security access control management 4.7.0 through 4.9.0, and acsweb in algowebapps 5.0.0, allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, a different vulnerability than cve-2013-6302.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-03-05
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in ibm algo one, as used in metadata management tools in uds 4.7.0 through 5.0.0, acsweb in algo security access control management 4.7.0 through 4.9.0, and acsweb in algowebapps 5.0.0, allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, a different vulnerability than cve-2013-6302.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-03-05\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in forum/neu.asp in fipscms 2.1 allows remote attackers to execute arbitrary sql commands via the kat parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-08-20
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in forum/neu.asp in fipscms 2.1 allows remote attackers to execute arbitrary sql commands via the kat parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-20\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 190
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Integer Overflow or Wraparound
Summary: a elevation of privilege vulnerability in the android media framework (mediadrmserver). product: android. versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-37710346.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-08-09
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.",
"role": "user"
},
{
"content": "CWE Code: 190\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Integer Overflow or Wraparound\nSummary: a elevation of privilege vulnerability in the android media framework (mediadrmserver). product: android. versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-37710346.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-08-09\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in matteo binda asp photo gallery 1.0 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to (a) imgbig.asp, (b) thumb.asp, and (c) thumbricerca.asp and the (2) ricerca parameter to (d) thumbricerca.asp.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-01-15
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in matteo binda asp photo gallery 1.0 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to (a) imgbig.asp, (b) thumb.asp, and (c) thumbricerca.asp and the (2) ricerca parameter to (d) thumbricerca.asp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-01-15\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Information Exposure
Summary: open dental before version 18.4 transmits the entire user database over the network when a remote unauthenticated user accesses the command prompt. this allows the attacker to gain access to usernames, password hashes, privilege levels, and more.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2018-12-12
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Information Exposure\nSummary: open dental before version 18.4 transmits the entire user database over the network when a remote unauthenticated user accesses the command prompt. this allows the attacker to gain access to usernames, password hashes, privilege levels, and more.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-12-12\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 74
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Summary: a vulnerability in the cronjob scheduler api of cisco digital network architecture (dna) center could allow an authenticated, remote attacker to perform a command injection attack. the vulnerability is due to incorrect input validation of user-supplied data. an attacker could exploit this vulnerability by sending a malicious packet. a successful exploit could allow the attacker to execute arbitrary commands with root privileges. cisco bug ids: cscvi42263.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-08-15
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection').",
"role": "user"
},
{
"content": "CWE Code: 74\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')\nSummary: a vulnerability in the cronjob scheduler api of cisco digital network architecture (dna) center could allow an authenticated, remote attacker to perform a command injection attack. the vulnerability is due to incorrect input validation of user-supplied data. an attacker could exploit this vulnerability by sending a malicious packet. a successful exploit could allow the attacker to execute arbitrary commands with root privileges. cisco bug ids: cscvi42263.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-08-15\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Permissions Privileges and Access Controls
Summary: symantec endpoint protection, prior to 14.2 ru1 & 12.1 ru6 mp10 and symantec endpoint protection small business edition, prior to 12.1 ru6 mp10c (12.1.7491.7002), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-07-31
Last Modified Date: 2019-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: symantec endpoint protection, prior to 14.2 ru1 & 12.1 ru6 mp10 and symantec endpoint protection small business edition, prior to 12.1 ru6 mp10c (12.1.7491.7002), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-31\nLast Modified Date: 2019-08-08",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.2
CWE Name: Permissions Privileges and Access Controls
Summary: gnome networkmanager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.networkmanagerusersettings and at_console.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/COMPLETE/COMPLETE
Published Date: 2009-03-05
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: gnome networkmanager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.networkmanagerusersettings and at_console.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/COMPLETE/COMPLETE\nPublished Date: 2009-03-05\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 835
Vulnerability Type: privilege_escalation
CVSS Score: 4.9
CWE Name: Loop with Unreachable Exit Condition ('Infinite Loop')
Summary: vmware esxi (6.7, 6.5, 6.0), workstation (15.x and 14.x) and fusion (11.x and 10.x) contain a denial-of-service vulnerability due to an infinite loop in a 3d-rendering shader. successfully exploiting this issue may allow an attacker with normal user privileges in the guest to make the vm unresponsive, and in some cases, possibly result other vms on the host or the host itself becoming unresponsive.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2018-10-09
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Loop with Unreachable Exit Condition ('Infinite Loop').",
"role": "user"
},
{
"content": "CWE Code: 835\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Loop with Unreachable Exit Condition ('Infinite Loop')\nSummary: vmware esxi (6.7, 6.5, 6.0), workstation (15.x and 14.x) and fusion (11.x and 10.x) contain a denial-of-service vulnerability due to an infinite loop in a 3d-rendering shader. successfully exploiting this issue may allow an attacker with normal user privileges in the guest to make the vm unresponsive, and in some cases, possibly result other vms on the host or the host itself becoming unresponsive.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2018-10-09\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Improper Input Validation
Summary: the xenmem_exchange handler in xen 4.2 and earlier does not properly check the memory address, which allows local pv guest os administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2012-12-13
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Improper Input Validation\nSummary: the xenmem_exchange handler in xen 4.2 and earlier does not properly check the memory address, which allows local pv guest os administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-12-13\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in click.php in adult banner exchange website allows remote attackers to execute arbitrary sql commands via the targetid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-10
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in click.php in adult banner exchange website allows remote attackers to execute arbitrary sql commands via the targetid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-10\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: gesior-aac before 2019-05-01 allows servicecategoryid sql injection in shop.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-08-26
Last Modified Date: 2019-09-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: gesior-aac before 2019-05-01 allows servicecategoryid sql injection in shop.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-26\nLast Modified Date: 2019-09-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the kernel-mode driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka "win32k elevation of privilege vulnerability," a different vulnerability than cve-2016-0093, cve-2016-0094, and cve-2016-0096.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-03-09
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the kernel-mode driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0093, cve-2016-0094, and cve-2016-0096.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-03-09\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 3.6
CWE Name: Permissions Privileges and Access Controls
Summary: the ubuntu accountsservice package before 0.6.14-1git1ubuntu1.1 does not properly drop privileges when changing language settings, which allows local users to modify arbitrary files via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/PARTIAL/PARTIAL
Published Date: 2014-04-16
Last Modified Date: 2014-04-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 3.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: the ubuntu accountsservice package before 0.6.14-1git1ubuntu1.1 does not properly drop privileges when changing language settings, which allows local users to modify arbitrary files via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/PARTIAL/PARTIAL\nPublished Date: 2014-04-16\nLast Modified Date: 2014-04-17",
"role": "assistant"
}
] |
CWE Code: 732
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Incorrect Permission Assignment for Critical Resource
Summary: a vulnerability in the disk check tool (disk-check.sh) for cisco wide area application services (waas) software could allow an authenticated, local attacker to elevate their privilege level to root. the attacker must have valid user credentials with super user privileges (level 15) to log in to the device. the vulnerability is due to insufficient validation of script files executed in the context of the disk check tool. an attacker could exploit this vulnerability by replacing one script file with a malicious script file while the affected tool is running. a successful exploit could allow the attacker to gain root-level privileges and take full control of the device. cisco bug ids: cscvi72673.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-06-07
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.",
"role": "user"
},
{
"content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: a vulnerability in the disk check tool (disk-check.sh) for cisco wide area application services (waas) software could allow an authenticated, local attacker to elevate their privilege level to root. the attacker must have valid user credentials with super user privileges (level 15) to log in to the device. the vulnerability is due to insufficient validation of script files executed in the context of the disk check tool. an attacker could exploit this vulnerability by replacing one script file with a malicious script file while the affected tool is running. a successful exploit could allow the attacker to gain root-level privileges and take full control of the device. cisco bug ids: cscvi72673.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-06-07\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.9
CWE Name: Improper Input Validation
Summary: a vulnerability in the plug-and-play (pnp) subsystem of the cisco aironet 1800, 2800, and 3800 series access points running a lightweight access point (ap) or mobility express image could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges. the vulnerability is due to insufficient validation of pnp server responses. the pnp feature is only active while the device does not contain a configuration, such as a first time boot or after a factory reset has been issued. an attacker with the ability to respond to pnp configuration requests from the affected device can exploit the vulnerability by returning malicious pnp responses. if a cisco application policy infrastructure controller - enterprise module (apic-em) is available on the network, the attacker would need to exploit the issue in the short window before a valid pnp response was received. if successful, the attacker could gain the ability to execute arbitrary code with root privileges on the underlying operating system of the device. cisco has confirmed that the only vulnerable software version is 8.3.102.0. cisco bug ids: cscvb42386.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-05-16
Last Modified Date: 2017-07-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.9\nCWE Name: Improper Input Validation\nSummary: a vulnerability in the plug-and-play (pnp) subsystem of the cisco aironet 1800, 2800, and 3800 series access points running a lightweight access point (ap) or mobility express image could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges. the vulnerability is due to insufficient validation of pnp server responses. the pnp feature is only active while the device does not contain a configuration, such as a first time boot or after a factory reset has been issued. an attacker with the ability to respond to pnp configuration requests from the affected device can exploit the vulnerability by returning malicious pnp responses. if a cisco application policy infrastructure controller - enterprise module (apic-em) is available on the network, the attacker would need to exploit the issue in the short window before a valid pnp response was received. if successful, the attacker could gain the ability to execute arbitrary code with root privileges on the underlying operating system of the device. cisco has confirmed that the only vulnerable software version is 8.3.102.0. cisco bug ids: cscvb42386.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-05-16\nLast Modified Date: 2017-07-11",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: lpusers as included with sco openserver 5.0 through 5.0.6 allows a local attacker to gain additional privileges via a buffer overflow attack in the '-u' command line parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2001-08-22
Last Modified Date: 2017-12-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: lpusers as included with sco openserver 5.0 through 5.0.6 allows a local attacker to gain additional privileges via a buffer overflow attack in the '-u' command line parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2001-08-22\nLast Modified Date: 2017-12-19",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an issue was discovered in certain apple products. ios before 11 is affected. macos before 10.13 is affected. tvos before 11 is affected. watchos before 4 is affected. the issue involves the third-party "sqlite" product. versions before 3.19.3 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-10-23
Last Modified Date: 2019-03-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 11 is affected. macos before 10.13 is affected. tvos before 11 is affected. watchos before 4 is affected. the issue involves the third-party \"sqlite\" product. versions before 3.19.3 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-10-23\nLast Modified Date: 2019-03-08",
"role": "assistant"
}
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.