text
stringlengths
365
3.97k
conversations
listlengths
3
3
CWE Code: 426 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Untrusted Search Path Summary: untrusted search path vulnerability in setup file of advance preparation for e-tax software (web version) (1.17.1) and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-07-07 Last Modified Date: 2017-07-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Untrusted Search Path.", "role": "user" }, { "content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in setup file of advance preparation for e-tax software (web version) (1.17.1) and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-07-07\nLast Modified Date: 2017-07-14", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Permissions Privileges and Access Controls Summary: an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1086, cve-2019-1087. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-07-15 Last Modified Date: 2019-07-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1086, cve-2019-1087.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-15\nLast Modified Date: 2019-07-17", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: the kernel in microsoft windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, and windows 7 sp1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "impersonation level check elevation of privilege vulnerability." Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-03-11 Last Modified Date: 2018-10-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the kernel in microsoft windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, and windows 7 sp1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka \"impersonation level check elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-03-11\nLast Modified Date: 2018-10-12", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: for the nvidia quadro, nvs, and geforce products, nvidia windows gpu display driver r340 before 342.00 and r375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) where unchecked input/output lengths in uvmlitecontroller device io control handling may lead to denial of service or potential escalation of privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-11-08 Last Modified Date: 2019-03-07
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: for the nvidia quadro, nvs, and geforce products, nvidia windows gpu display driver r340 before 342.00 and r375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) where unchecked input/output lengths in uvmlitecontroller device io control handling may lead to denial of service or potential escalation of privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-11-08\nLast Modified Date: 2019-03-07", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in public/code/cp_polls_results.php in all in one control panel (aiocp) 1.4 allows remote attackers to execute arbitrary sql commands via the poll_id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-10-29 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in public/code/cp_polls_results.php in all in one control panel (aiocp) 1.4 allows remote attackers to execute arbitrary sql commands via the poll_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-29\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 362 Vulnerability Type: privilege_escalation CVSS Score: 8.5 CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Summary: the domain management component of tibco software inc.'s tibco jasperreports server, tibco jasperreports server community edition, tibco jasperreports server for activematrix bpm, tibco jaspersoft for aws with multi-tenancy, and tibco jaspersoft reporting and analytics for aws contains a race-condition vulnerability that may allow any users with domain save privileges to gain superuser privileges. affected releases are tibco software inc.'s tibco jasperreports server: versions up to and including 6.3.4; 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, tibco jasperreports server community edition: versions up to and including 7.1.0, tibco jasperreports server for activematrix bpm: versions up to and including 6.4.3, tibco jaspersoft for aws with multi-tenancy: versions up to and including 7.1.0, and tibco jaspersoft reporting and analytics for aws: versions up to and including 7.1.0. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-03-07 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').", "role": "user" }, { "content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 8.5\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: the domain management component of tibco software inc.'s tibco jasperreports server, tibco jasperreports server community edition, tibco jasperreports server for activematrix bpm, tibco jaspersoft for aws with multi-tenancy, and tibco jaspersoft reporting and analytics for aws contains a race-condition vulnerability that may allow any users with domain save privileges to gain superuser privileges. affected releases are tibco software inc.'s tibco jasperreports server: versions up to and including 6.3.4; 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, tibco jasperreports server community edition: versions up to and including 7.1.0, tibco jasperreports server for activematrix bpm: versions up to and including 6.4.3, tibco jaspersoft for aws with multi-tenancy: versions up to and including 7.1.0, and tibco jaspersoft reporting and analytics for aws: versions up to and including 7.1.0.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-03-07\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 59 Vulnerability Type: privilege_escalation CVSS Score: 6.6 CWE Name: Improper Link Resolution Before File Access ('Link Following') Summary: deepin-clone before 1.1.3 uses a fixed path /tmp/partclone.log in the helper::getpartitionsizeinfo() function to write a log file as root, and follows symlinks there. an unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. the content is not attacker controlled. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/COMPLETE/COMPLETE Published Date: 2019-07-04 Last Modified Date: 2019-08-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Link Resolution Before File Access ('Link Following').", "role": "user" }, { "content": "CWE Code: 59\nVulnerability Type: privilege_escalation\nCVSS Score: 6.6\nCWE Name: Improper Link Resolution Before File Access ('Link Following')\nSummary: deepin-clone before 1.1.3 uses a fixed path /tmp/partclone.log in the helper::getpartitionsizeinfo() function to write a log file as root, and follows symlinks there. an unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. the content is not attacker controlled.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/COMPLETE/COMPLETE\nPublished Date: 2019-07-04\nLast Modified Date: 2019-08-14", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in mail.php in phpenpals 1.1 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter. note: the profile.php vector is already covered by cve-2006-0074. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-05-29 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in mail.php in phpenpals 1.1 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter. note: the profile.php vector is already covered by cve-2006-0074.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-05-29\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 565 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Reliance on Cookies without Validation and Integrity Checking Summary: an unprivileged user of the unitrends enterprise backup before 9.0.0 web server can escalate to root privileges by modifying the "token" cookie issued at login. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-04-12 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Reliance on Cookies without Validation and Integrity Checking.", "role": "user" }, { "content": "CWE Code: 565\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Reliance on Cookies without Validation and Integrity Checking\nSummary: an unprivileged user of the unitrends enterprise backup before 9.0.0 web server can escalate to root privileges by modifying the \"token\" cookie issued at login.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-04-12\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 281 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Improper Preservation of Permissions Summary: microsoft windows 7 sp1, windows server 2008 sp2 and r2 sp1, windows 8.1 and windows rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability due to the way that the windows common log file system (clfs) driver handles objects in memory, aka "windows clfs elevation of privilege vulnerability". Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-07-11 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Preservation of Permissions.", "role": "user" }, { "content": "CWE Code: 281\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Preservation of Permissions\nSummary: microsoft windows 7 sp1, windows server 2008 sp2 and r2 sp1, windows 8.1 and windows rt 8.1, windows server 2012 and r2, windows 10 gold, 1511, 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability due to the way that the windows common log file system (clfs) driver handles objects in memory, aka \"windows clfs elevation of privilege vulnerability\".\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-07-11\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in stats.php in elite gaming ladders 3.0 allows remote attackers to execute arbitrary sql commands via the account parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-11-02 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in stats.php in elite gaming ladders 3.0 allows remote attackers to execute arbitrary sql commands via the account parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-02\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in avaya sip enablement services (ses) in avaya avaya communication manager 3.x, 4.0, and 5.0 (1) allow remote attackers to execute arbitrary sql commands via unspecified vectors related to profiles in the sip personal information manager (spim) in the web interface; and allow remote authenticated users to execute arbitrary sql commands via unspecified vectors related to (2) permissions for spim profiles in the web interface and (3) a crafted sip request to the sip server. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-04-01 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in avaya sip enablement services (ses) in avaya avaya communication manager 3.x, 4.0, and 5.0 (1) allow remote attackers to execute arbitrary sql commands via unspecified vectors related to profiles in the sip personal information manager (spim) in the web interface; and allow remote authenticated users to execute arbitrary sql commands via unspecified vectors related to (2) permissions for spim profiles in the web interface and (3) a crafted sip request to the sip server.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-04-01\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: an issue was discovered in certain apple products. macos before 10.13.5 is affected. the issue involves the "windows server" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-06-08 Last Modified Date: 2019-02-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. macos before 10.13.5 is affected. the issue involves the \"windows server\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-06-08\nLast Modified Date: 2019-02-26", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: the rt_setgate function in the kernel in apple ios before 8 and apple tv before 7 allows local users to gain privileges or cause a denial of service (out-of-bounds read and device crash) via a crafted call. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2014-09-18 Last Modified Date: 2019-03-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the rt_setgate function in the kernel in apple ios before 8 and apple tv before 7 allows local users to gain privileges or cause a denial of service (out-of-bounds read and device crash) via a crafted call.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-09-18\nLast Modified Date: 2019-03-08", "role": "assistant" } ]
CWE Code: 416 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Use After Free Summary: an issue was discovered in certain apple products. ios before 10.3 is affected. macos before 10.12.4 is affected. tvos before 10.2 is affected. watchos before 3.2 is affected. the issue involves the "kernel" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-04-02 Last Modified Date: 2019-03-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Use After Free.", "role": "user" }, { "content": "CWE Code: 416\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Use After Free\nSummary: an issue was discovered in certain apple products. ios before 10.3 is affected. macos before 10.12.4 is affected. tvos before 10.2 is affected. watchos before 3.2 is affected. the issue involves the \"kernel\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-04-02\nLast Modified Date: 2019-03-08", "role": "assistant" } ]
CWE Code: 352 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Cross-Site Request Forgery (CSRF) Summary: a vulnerability in the web-based management interface of cisco packaged contact center enterprise could allow an unauthenticated, remote attacker to conduct a csrf attack and perform arbitrary actions on an affected device. the vulnerability is due to insufficient csrf protections for the web-based management interface of an affected device. an attacker could exploit this vulnerability by persuading a user of the interface to follow a customized link. a successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-10-05 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF).", "role": "user" }, { "content": "CWE Code: 352\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Cross-Site Request Forgery (CSRF)\nSummary: a vulnerability in the web-based management interface of cisco packaged contact center enterprise could allow an unauthenticated, remote attacker to conduct a csrf attack and perform arbitrary actions on an affected device. the vulnerability is due to insufficient csrf protections for the web-based management interface of an affected device. an attacker could exploit this vulnerability by persuading a user of the interface to follow a customized link. a successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-10-05\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Information Exposure Summary: a vulnerability in the web-based management interface of cisco spa100 series analog telephone adapters (atas) could allow an authenticated, remote attacker to access sensitive information on an affected device. the vulnerability is due to unsafe handling of user credentials. an attacker could exploit this vulnerability by viewing portions of the web-based management interface of an affected device. a successful exploit could allow the attacker to access administrative credentials and potentially gain elevated privileges by reusing stolen credentials on the affected device. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-10-16 Last Modified Date: 2019-10-21
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: a vulnerability in the web-based management interface of cisco spa100 series analog telephone adapters (atas) could allow an authenticated, remote attacker to access sensitive information on an affected device. the vulnerability is due to unsafe handling of user credentials. an attacker could exploit this vulnerability by viewing portions of the web-based management interface of an affected device. a successful exploit could allow the attacker to access administrative credentials and potentially gain elevated privileges by reusing stolen credentials on the affected device.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-10-16\nLast Modified Date: 2019-10-21", "role": "assistant" } ]
CWE Code: 94 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Improper Control of Generation of Code ('Code Injection') Summary: a csv injection vulnerability was discovered in shopy point of sale v1.0 that allows a user with low level privileges to inject a command that will be included in the exported csv file, leading to possible code execution. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-05-01 Last Modified Date: 2018-06-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Control of Generation of Code ('Code Injection').", "role": "user" }, { "content": "CWE Code: 94\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Control of Generation of Code ('Code Injection')\nSummary: a csv injection vulnerability was discovered in shopy point of sale v1.0 that allows a user with low level privileges to inject a command that will be included in the exported csv file, leading to possible code execution.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-05-01\nLast Modified Date: 2018-06-13", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: multiple vulnerabilities in cisco webex network recording player for microsoft windows and cisco webex player for microsoft windows could allow an attacker to execute arbitrary code on an affected system. the vulnerabilities exist because the affected software improperly validates advanced recording format (arf) and webex recording format (wrf) files. an attacker could exploit these vulnerabilities by sending a user a malicious arf or wrf file through a link or email attachment and persuading the user to open the file with the affected software on the local system. a successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-08-07 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: multiple vulnerabilities in cisco webex network recording player for microsoft windows and cisco webex player for microsoft windows could allow an attacker to execute arbitrary code on an affected system. the vulnerabilities exist because the affected software improperly validates advanced recording format (arf) and webex recording format (wrf) files. an attacker could exploit these vulnerabilities by sending a user a malicious arf or wrf file through a link or email attachment and persuading the user to open the file with the affected software on the local system. a successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-08-07\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 310 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Cryptographic Issues Summary: livezilla 5.1.2.1 and earlier includes the md5 hash of the operator password in plaintext in javascript code that is generated by lz/mobile/chat.php, which allows remote attackers to obtain sensitive information and gain privileges by accessing the loginname and loginpassword variables using an independent cross-site scripting (xss) attack. note: this vulnerability exists because of an incomplete fix for cve-2013-7033. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2014-05-19 Last Modified Date: 2014-05-20
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Cryptographic Issues.", "role": "user" }, { "content": "CWE Code: 310\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Cryptographic Issues\nSummary: livezilla 5.1.2.1 and earlier includes the md5 hash of the operator password in plaintext in javascript code that is generated by lz/mobile/chat.php, which allows remote attackers to obtain sensitive information and gain privileges by accessing the loginname and loginpassword variables using an independent cross-site scripting (xss) attack. note: this vulnerability exists because of an incomplete fix for cve-2013-7033.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-05-19\nLast Modified Date: 2014-05-20", "role": "assistant" } ]
CWE Code: 59 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Improper Link Resolution Before File Access ('Link Following') Summary: the lha.sys driver before 1.1.1811.2101 in lg device manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted ioctl requests and elevate system privileges. this occurs because the device object has an associated symbolic link and an open dacl. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-02-18 Last Modified Date: 2019-02-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Link Resolution Before File Access ('Link Following').", "role": "user" }, { "content": "CWE Code: 59\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Improper Link Resolution Before File Access ('Link Following')\nSummary: the lha.sys driver before 1.1.1811.2101 in lg device manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted ioctl requests and elevate system privileges. this occurs because the device object has an associated symbolic link and an open dacl.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-02-18\nLast Modified Date: 2019-02-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 5.1 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in usersettings.php in e107 0.7.26, and possibly other versions before 1.0.0, allows remote attackers to execute arbitrary sql commands via the username parameter. Access Authentication: NONE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2012-01-04 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.1\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in usersettings.php in e107 0.7.26, and possibly other versions before 1.0.0, allows remote attackers to execute arbitrary sql commands via the username parameter.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-01-04\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 3.6 CWE Name: Improper Privilege Management Summary: the msio64.sys and msio32.sys drivers in patriot viper rgb before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain nt authority\system privileges, by mapping \device\physicalmemory into the calling process via zwopensection and zwmapviewofsection. Access Authentication: NONE Access Complexity: UNKNOWN Access Vector: UNKNOWN Impact (C/I/A): NONE/NONE/NONE Published Date: 2019-11-09 Last Modified Date: 2019-11-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 3.6\nCWE Name: Improper Privilege Management\nSummary: the msio64.sys and msio32.sys drivers in patriot viper rgb before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain nt authority\\system privileges, by mapping \\device\\physicalmemory into the calling process via zwopensection and zwmapviewofsection.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-09\nLast Modified Date: 2019-11-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: xss and sqli in huge it joomla slider v1.0.9 extension Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-10-27 Last Modified Date: 2016-12-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: xss and sqli in huge it joomla slider v1.0.9 extension\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-10-27\nLast Modified Date: 2016-12-22", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: buffer overflow in akeprotect.sys 3.3.3.0 in isecsoft anti-keylogger elite 3.3.0 and earlier, and possibly other versions including 3.3.3, allows local users to gain privileges via long inputs to the (1) 0x002224a4, (2) 0x002224c0, and (3) 0x002224cc ioctl. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2008-11-13 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in akeprotect.sys 3.3.3.0 in isecsoft anti-keylogger elite 3.3.0 and earlier, and possibly other versions including 3.3.3, allows local users to gain privileges via long inputs to the (1) 0x002224a4, (2) 0x002224c0, and (3) 0x002224cc ioctl.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2008-11-13\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: the kernel in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka "windows kernel memory elevation of privilege vulnerability," a different vulnerability than cve-2015-6171 and cve-2015-6174. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-12-09 Last Modified Date: 2019-05-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the kernel in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"windows kernel memory elevation of privilege vulnerability,\" a different vulnerability than cve-2015-6171 and cve-2015-6174.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-12-09\nLast Modified Date: 2019-05-15", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Improper Access Control Summary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.28 and prior to 6.0.6. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle vm virtualbox accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:h/i:n/a:n). Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-04-23 Last Modified Date: 2019-07-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.28 and prior to 6.0.6. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle vm virtualbox accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:h/i:n/a:n).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-04-23\nLast Modified Date: 2019-07-30", "role": "assistant" } ]
CWE Code: 416 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Use After Free Summary: an issue was discovered in secdrv.sys as shipped in microsoft windows vista, windows 7, windows 8, and windows 8.1 before kb3086255, and as shipped in macrovision safedisc. two carefully timed calls to ioctl 0xca002813 can cause a race condition that leads to a use-after-free. when exploited, an unprivileged attacker can run arbitrary code in the kernel. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-02-26 Last Modified Date: 2018-03-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Use After Free.", "role": "user" }, { "content": "CWE Code: 416\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Use After Free\nSummary: an issue was discovered in secdrv.sys as shipped in microsoft windows vista, windows 7, windows 8, and windows 8.1 before kb3086255, and as shipped in macrovision safedisc. two carefully timed calls to ioctl 0xca002813 can cause a race condition that leads to a use-after-free. when exploited, an unprivileged attacker can run arbitrary code in the kernel.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-02-26\nLast Modified Date: 2018-03-22", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Permissions Privileges and Access Controls Summary: untrusted search path vulnerability in installers for specification check program (social insurance) ver. 9.00 and earlier, todokesho print program ver. 5.00 and earlier, device data encryption program ver. 1.00 and earlier, and todokesho creation program ver. 15.00 and earlier available prior to october 17, 2016 allows remote attackers to gain privileges via a trojan horse dll in an unspecified directory. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-06-09 Last Modified Date: 2017-06-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: untrusted search path vulnerability in installers for specification check program (social insurance) ver. 9.00 and earlier, todokesho print program ver. 5.00 and earlier, device data encryption program ver. 1.00 and earlier, and todokesho creation program ver. 15.00 and earlier available prior to october 17, 2016 allows remote attackers to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-06-09\nLast Modified Date: 2017-06-22", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: sql_injection CVSS Score: 3.5 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: cross-site scripting (xss) vulnerability in the sql editor in phpmyadmin 4.5.x before 4.5.4 allows remote authenticated users to inject arbitrary web script or html via a sql query that triggers json data in a response. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2016-02-20 Last Modified Date: 2016-08-02
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: sql_injection\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: cross-site scripting (xss) vulnerability in the sql editor in phpmyadmin 4.5.x before 4.5.4 allows remote authenticated users to inject arbitrary web script or html via a sql query that triggers json data in a response.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2016-02-20\nLast Modified Date: 2016-08-02", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: ** disputed ** sql injection vulnerability in index.php in jamit job board 2.4.1 and earlier allows remote attackers to execute arbitrary sql commands via the cat parameter. note: the vendor has disputed this issue, saying "the vulnerability is without any basis and did not actually work." cve has not verified either the vendor or researcher statements, but the original researcher is known to make frequent mistakes when reporting sql injection. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2005-12-14 Last Modified Date: 2012-12-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: ** disputed ** sql injection vulnerability in index.php in jamit job board 2.4.1 and earlier allows remote attackers to execute arbitrary sql commands via the cat parameter. note: the vendor has disputed this issue, saying \"the vulnerability is without any basis and did not actually work.\" cve has not verified either the vendor or researcher statements, but the original researcher is known to make frequent mistakes when reporting sql injection.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2005-12-14\nLast Modified Date: 2012-12-13", "role": "assistant" } ]
CWE Code: 190 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Integer Overflow or Wraparound Summary: in libmpegtpdec, there is a possible out of bounds write due to an integer overflow. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112662270 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-09-27 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.", "role": "user" }, { "content": "CWE Code: 190\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Integer Overflow or Wraparound\nSummary: in libmpegtpdec, there is a possible out of bounds write due to an integer overflow. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112662270\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in cisco/services/phonecdirectory.php in fonality trixbox 2.2.4 allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-02-23 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in cisco/services/phonecdirectory.php in fonality trixbox 2.2.4 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-02-23\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 189 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Numeric Errors Summary: integer overflow in the native_handle_create function in libcutils/native_handle.c in android before 5.1.1 lmy48m allows attackers to obtain a different application's privileges or cause a denial of service (binder heap memory corruption) via a crafted application, aka internal bug 19334482. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-10-01 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Numeric Errors.", "role": "user" }, { "content": "CWE Code: 189\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Numeric Errors\nSummary: integer overflow in the native_handle_create function in libcutils/native_handle.c in android before 5.1.1 lmy48m allows attackers to obtain a different application's privileges or cause a denial of service (binder heap memory corruption) via a crafted application, aka internal bug 19334482.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-10-01\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: an issue was discovered in sales & company management system (scms) through 2018-06-06. it has sql injection via the member/member_order.php type parameter, related to the o_state parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-12-06 Last Modified Date: 2019-01-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in sales & company management system (scms) through 2018-06-06. it has sql injection via the member/member_order.php type parameter, related to the o_state parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-12-06\nLast Modified Date: 2019-01-11", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Permissions Privileges and Access Controls Summary: nfsv4 in the linux kernel 2.6.18, and possibly other versions, does not properly clean up an inode when an o_excl create fails, which causes files to be created with insecure settings such as setuid bits, and possibly allows local users to gain privileges, related to the execution of the do_open_permission function even when a create fails. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-09-22 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: nfsv4 in the linux kernel 2.6.18, and possibly other versions, does not properly clean up an inode when an o_excl create fails, which causes files to be created with insecure settings such as setuid bits, and possibly allows local users to gain privileges, related to the execution of the do_open_permission function even when a create fails.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-09-22\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in the shambo2 (com_shambo2) component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the itemid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-02-06 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the shambo2 (com_shambo2) component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the itemid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-06\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the jtips (com_jtips) component 1.0.7 and 1.0.9 for joomla! allows remote attackers to execute arbitrary sql commands via the season parameter in a ladder action to index.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-11-18 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the jtips (com_jtips) component 1.0.7 and 1.0.9 for joomla! allows remote attackers to execute arbitrary sql commands via the season parameter in a ladder action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-11-18\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: an issue was discovered in certain apple products. ios before 10.3.2 is affected. macos before 10.12.5 is affected. the issue involves the "sqlite" component. it allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-05-22 Last Modified Date: 2017-07-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 10.3.2 is affected. macos before 10.12.5 is affected. the issue involves the \"sqlite\" component. it allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-05-22\nLast Modified Date: 2017-07-08", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in post.php in beehive forum 0.7.1 and earlier allows remote attackers to execute arbitrary sql commands via the t_dedupe parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-12-05 Last Modified Date: 2018-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in post.php in beehive forum 0.7.1 and earlier allows remote attackers to execute arbitrary sql commands via the t_dedupe parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-12-05\nLast Modified Date: 2018-10-15", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Permissions Privileges and Access Controls Summary: the mediatek display driver in android before 2016-07-05 on android one devices allows attackers to gain privileges via a crafted application, aka android internal bug 28402341 and mediatek internal bug alps02715341. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-07-11 Last Modified Date: 2016-07-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: the mediatek display driver in android before 2016-07-05 on android one devices allows attackers to gain privileges via a crafted application, aka android internal bug 28402341 and mediatek internal bug alps02715341.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-11\nLast Modified Date: 2016-07-12", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in phil taylor comments (com_comments, aka review script) 0.5.8.5g and earlier component for mambo allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-02-14 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in phil taylor comments (com_comments, aka review script) 0.5.8.5g and earlier component for mambo allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-14\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 77 Vulnerability Type: privilege_escalation CVSS Score: 9.0 CWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection') Summary: a vulnerability in the web-based management interface of cisco integrated management controller (imc) software could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. the vulnerability is due to insufficient validation of command input by the affected software. an attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. a successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-10-05 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in a Command ('Command Injection').", "role": "user" }, { "content": "CWE Code: 77\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')\nSummary: a vulnerability in the web-based management interface of cisco integrated management controller (imc) software could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. the vulnerability is due to insufficient validation of command input by the affected software. an attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. a successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-10-05\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: an issue was discovered on the "bank account matching - receipts" screen of the general ledger component in weberp 4.15. bankmatching.php has blind sql injection via the amtclear_ parameter. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-11-22 Last Modified Date: 2018-12-18
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered on the \"bank account matching - receipts\" screen of the general ledger component in weberp 4.15. bankmatching.php has blind sql injection via the amtclear_ parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-11-22\nLast Modified Date: 2018-12-18", "role": "assistant" } ]
CWE Code: 352 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Cross-Site Request Forgery (CSRF) Summary: a vulnerability in the web-based management interface of cisco identity services engine (ise) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (csrf) attack and perform arbitrary actions on an affected device. the vulnerability is due to insufficient csrf protections for the web-based management interface of an affected device. an attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. a successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. cisco bug ids: cscvi85159. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-08-01 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF).", "role": "user" }, { "content": "CWE Code: 352\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Cross-Site Request Forgery (CSRF)\nSummary: a vulnerability in the web-based management interface of cisco identity services engine (ise) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (csrf) attack and perform arbitrary actions on an affected device. the vulnerability is due to insufficient csrf protections for the web-based management interface of an affected device. an attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. a successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. cisco bug ids: cscvi85159.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-08-01\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 189 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Numeric Errors Summary: qemu (aka quick emulator) built with the rocker switch emulation support is vulnerable to an off-by-one error. it happens while processing transmit (tx) descriptors in 'tx_consume' routine, if a descriptor was to have more than allowed (rocker_tx_frags_max=16) fragments. a privileged user inside guest could use this flaw to cause memory leakage on the host or crash the qemu process instance resulting in dos issue. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2016-12-29 Last Modified Date: 2017-07-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Numeric Errors.", "role": "user" }, { "content": "CWE Code: 189\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Numeric Errors\nSummary: qemu (aka quick emulator) built with the rocker switch emulation support is vulnerable to an off-by-one error. it happens while processing transmit (tx) descriptors in 'tx_consume' routine, if a descriptor was to have more than allowed (rocker_tx_frags_max=16) fragments. a privileged user inside guest could use this flaw to cause memory leakage on the host or crash the qemu process instance resulting in dos issue.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2016-12-29\nLast Modified Date: 2017-07-01", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: thinkphp before 5.1.23 allows sql injection via the public/index/index/test/index query string. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-09-03 Last Modified Date: 2018-10-31
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: thinkphp before 5.1.23 allows sql injection via the public/index/index/test/index query string.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-09-03\nLast Modified Date: 2018-10-31", "role": "assistant" } ]
CWE Code: 78 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Summary: an unspecified interface in sap trex 7.10 revision 63 allows remote attackers to execute arbitrary os commands with sidadm privileges via unspecified vectors, aka sap security note 2234226. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-08-05 Last Modified Date: 2016-11-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').", "role": "user" }, { "content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: an unspecified interface in sap trex 7.10 revision 63 allows remote attackers to execute arbitrary os commands with sidadm privileges via unspecified vectors, aka sap security note 2234226.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-08-05\nLast Modified Date: 2016-11-28", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in utilities/login.asp in nukedit 4.9.x, and possibly earlier, allows remote attackers to execute arbitrary sql commands via the email parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-12-15 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in utilities/login.asp in nukedit 4.9.x, and possibly earlier, allows remote attackers to execute arbitrary sql commands via the email parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-15\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in links.php in scriptsagent.com links directory 1.1 allows remote authenticated users to execute arbitrary sql commands via the cat_id parameter in a list action. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-04-17 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in links.php in scriptsagent.com links directory 1.1 allows remote authenticated users to execute arbitrary sql commands via the cat_id parameter in a list action.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-04-17\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: ** disputed ** sql injection vulnerability in inc/common.php in globalmegacorp dvddb 0.6 allows remote attackers to execute arbitrary sql commands via the user parameter. note: this issue has been disputed by a reliable third party, who states that inc/common.php only contains function definitions. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-02-06 Last Modified Date: 2018-10-16
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: ** disputed ** sql injection vulnerability in inc/common.php in globalmegacorp dvddb 0.6 allows remote attackers to execute arbitrary sql commands via the user parameter. note: this issue has been disputed by a reliable third party, who states that inc/common.php only contains function definitions.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-02-06\nLast Modified Date: 2018-10-16", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in the monitoring feature in the http api in abbyy flexicapture before 12 release 2 allow an attacker to execute arbitrary sql commands via the mask, sortorder, filter, or order parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-02-10 Last Modified Date: 2019-02-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the monitoring feature in the http api in abbyy flexicapture before 12 release 2 allow an attacker to execute arbitrary sql commands via the mask, sortorder, filter, or order parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-02-10\nLast Modified Date: 2019-02-13", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 7.6 CWE Name: Improper Access Control Summary: an elevation of privilege vulnerability in the qualcomm wi-fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31750554. references: qc-cr#1079596. Access Authentication: NONE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-01-12 Last Modified Date: 2017-01-18
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Improper Access Control\nSummary: an elevation of privilege vulnerability in the qualcomm wi-fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31750554. references: qc-cr#1079596.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-01-18", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: the secure-session feature in the mm-video-v4l2 venc component in mediaserver in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 mishandles heap pointers, which allows attackers to gain privileges via a crafted application, aka internal bug 28815329. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-08-05 Last Modified Date: 2016-11-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the secure-session feature in the mm-video-v4l2 venc component in mediaserver in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 mishandles heap pointers, which allows attackers to gain privileges via a crafted application, aka internal bug 28815329.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-08-05\nLast Modified Date: 2016-11-28", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: the kernel in apple ios before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than cve-2015-5868 and cve-2015-5903. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-09-18 Last Modified Date: 2016-12-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the kernel in apple ios before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than cve-2015-5868 and cve-2015-5903.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-09-18\nLast Modified Date: 2016-12-22", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in rightinpoint lyrics script 3.0 allows remote attackers to execute arbitrary sql commands via the artist_id parameter in an addalbum action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-07-13 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in rightinpoint lyrics script 3.0 allows remote attackers to execute arbitrary sql commands via the artist_id parameter in an addalbum action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-07-13\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Input Validation Summary: huawei alp-l09 smart phones with versions earlier than alp-l09 8.0.0.150(c432) have an insufficient input validation vulnerability due to lack of parameter check. an attacker tricks the user who has root privilege to install a crafted application, the application may modify the specific data to exploit the vulnerability. successful exploit could allow the attacker to execute arbitrary code. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-09-12 Last Modified Date: 2018-11-20
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Input Validation\nSummary: huawei alp-l09 smart phones with versions earlier than alp-l09 8.0.0.150(c432) have an insufficient input validation vulnerability due to lack of parameter check. an attacker tricks the user who has root privilege to install a crafted application, the application may modify the specific data to exploit the vulnerability. successful exploit could allow the attacker to execute arbitrary code.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-09-12\nLast Modified Date: 2018-11-20", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Information Exposure Summary: there is an information disclosure vulnerability on secure input of certain huawei smartphones in versions earlier than tony-al00b 9.1.0.216(c00e214r2p1). the secure input does not properly limit certain system privilege. an attacker tricks the user to install a malicious application and successful exploit could result in information disclosure. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-07-17 Last Modified Date: 2019-07-24
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Information Exposure\nSummary: there is an information disclosure vulnerability on secure input of certain huawei smartphones in versions earlier than tony-al00b 9.1.0.216(c00e214r2p1). the secure input does not properly limit certain system privilege. an attacker tricks the user to install a malicious application and successful exploit could result in information disclosure.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-07-17\nLast Modified Date: 2019-07-24", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Permissions Privileges and Access Controls Summary: symmetricom s350i 2.70.15 allows remote authenticated users to gain privileges via vectors related to pushing unauthenticated users to the login page. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-01-11 Last Modified Date: 2018-01-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: symmetricom s350i 2.70.15 allows remote authenticated users to gain privileges via vectors related to pushing unauthenticated users to the login page.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-01-11\nLast Modified Date: 2018-01-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in videogalleryrss.php in the apptha wordpress video gallery (contus-video-gallery) plugin before 2.8 for wordpress allows remote attackers to execute arbitrary sql commands via the vid parameter in a rss action to wp-admin/admin-ajax.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2015-02-24 Last Modified Date: 2016-11-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in videogalleryrss.php in the apptha wordpress video gallery (contus-video-gallery) plugin before 2.8 for wordpress allows remote attackers to execute arbitrary sql commands via the vid parameter in a rss action to wp-admin/admin-ajax.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-02-24\nLast Modified Date: 2016-11-30", "role": "assistant" } ]
CWE Code: 426 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Untrusted Search Path Summary: code42 app through version 7.0.2 for windows has an untrusted search path. in certain situations, a non-administrative attacker on the local machine could create or modify a dynamic-link library (dll). the code42 service could then load it at runtime, and potentially execute arbitrary code at an elevated privilege on the local machine. Access Authentication: NONE Access Complexity: UNKNOWN Access Vector: UNKNOWN Impact (C/I/A): NONE/NONE/NONE Published Date: 2019-11-19 Last Modified Date: 2019-11-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Untrusted Search Path.", "role": "user" }, { "content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Untrusted Search Path\nSummary: code42 app through version 7.0.2 for windows has an untrusted search path. in certain situations, a non-administrative attacker on the local machine could create or modify a dynamic-link library (dll). the code42 service could then load it at runtime, and potentially execute arbitrary code at an elevated privilege on the local machine.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-19\nLast Modified Date: 2019-11-19", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the event list plugin 0.7.8 for wordpress allows an authenticated user to execute arbitrary sql commands via the id parameter to wp-admin/admin.php. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-06-13 Last Modified Date: 2017-08-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the event list plugin 0.7.8 for wordpress allows an authenticated user to execute arbitrary sql commands via the id parameter to wp-admin/admin.php.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-06-13\nLast Modified Date: 2017-08-13", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in admin.link.modify.php in million dollar text links 1.0 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-12-04 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in admin.link.modify.php in million dollar text links 1.0 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-04\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Improper Input Validation Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2019-04-23 Last Modified Date: 2019-08-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Input Validation\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-04-23\nLast Modified Date: 2019-08-14", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in admin_login.php in nct jobs portal script allow remote attackers to execute arbitrary sql commands via the (1) user parameter (aka login field) and (2) passwd parameter (aka password field). note: some of these details are obtained from third party information. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-04-29 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in admin_login.php in nct jobs portal script allow remote attackers to execute arbitrary sql commands via the (1) user parameter (aka login field) and (2) passwd parameter (aka password field). note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-04-29\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 78 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Summary: a vulnerability in the web portal of cisco enterprise nfv infrastructure software (nfvis) could allow an unauthenticated, remote attacker to perform a command injection attack and execute arbitrary commands with root privileges. the vulnerability is due to insufficient input validation by the web portal framework. an attacker could exploit this vulnerability by providing malicious input during web portal authentication. a successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-08-08 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').", "role": "user" }, { "content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: a vulnerability in the web portal of cisco enterprise nfv infrastructure software (nfvis) could allow an unauthenticated, remote attacker to perform a command injection attack and execute arbitrary commands with root privileges. the vulnerability is due to insufficient input validation by the web portal framework. an attacker could exploit this vulnerability by providing malicious input during web portal authentication. a successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-08-08\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: off-by-one error in core/hdd/src/wlan_hdd_cfg.c in the qualcomm wi-fi driver in android before 2016-10-05 on nexus 5x and android one devices allows attackers to gain privileges or cause a denial of service (buffer overflow) via a crafted application that makes a get_cfg ioctl call, aka android internal bug 30874066 and qualcomm internal bug cr 1000853. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-10-10 Last Modified Date: 2016-12-06
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: off-by-one error in core/hdd/src/wlan_hdd_cfg.c in the qualcomm wi-fi driver in android before 2016-10-05 on nexus 5x and android one devices allows attackers to gain privileges or cause a denial of service (buffer overflow) via a crafted application that makes a get_cfg ioctl call, aka android internal bug 30874066 and qualcomm internal bug cr 1000853.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-10-10\nLast Modified Date: 2016-12-06", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in gallery/index.php in sijio community software allows remote attackers to execute arbitrary sql commands via the parent parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-07-12 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in gallery/index.php in sijio community software allows remote attackers to execute arbitrary sql commands via the parent parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-07-12\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 352 Vulnerability Type: sql_injection CVSS Score: 2.6 CWE Name: Cross-Site Request Forgery (CSRF) Summary: cross-site request forgery (csrf) vulnerability in admin.php in eticket 1.5.5.2 allows remote attackers to change the administrative password and possibly perform other administrative tasks. note: either the old password must be known, or the attacker must leverage a separate sql injection vulnerability. Access Authentication: NONE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2008-01-15 Last Modified Date: 2018-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF).", "role": "user" }, { "content": "CWE Code: 352\nVulnerability Type: sql_injection\nCVSS Score: 2.6\nCWE Name: Cross-Site Request Forgery (CSRF)\nSummary: cross-site request forgery (csrf) vulnerability in admin.php in eticket 1.5.5.2 allows remote attackers to change the administrative password and possibly perform other administrative tasks. note: either the old password must be known, or the attacker must leverage a separate sql injection vulnerability.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2008-01-15\nLast Modified Date: 2018-10-15", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the kitchen recipe (mv_cooking) extension before 0.4.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors, as exploited in the wild as of february 2012. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2012-02-14 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the kitchen recipe (mv_cooking) extension before 0.4.1 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors, as exploited in the wild as of february 2012.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-02-14\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.9 CWE Name: Permissions Privileges and Access Controls Summary: cumin before 0.1.5444, as used in red hat enterprise messaging, realtime, and grid (mrg) 2.0, allows remote authenticated users to modify condor attributes and possibly gain privileges via crafted additional parameters in an http post request, which triggers a job attribute change request to condor. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/NONE Published Date: 2012-09-28 Last Modified Date: 2013-11-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: cumin before 0.1.5444, as used in red hat enterprise messaging, realtime, and grid (mrg) 2.0, allows remote authenticated users to modify condor attributes and possibly gain privileges via crafted additional parameters in an http post request, which triggers a job attribute change request to condor.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2012-09-28\nLast Modified Date: 2013-11-25", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: steps/utils/save_pref.inc in roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct sql injection attacks, and execute arbitrary code. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2013-11-05 Last Modified Date: 2014-03-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: steps/utils/save_pref.inc in roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct sql injection attacks, and execute arbitrary code.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-11-05\nLast Modified Date: 2014-03-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in kategori.asp in furkan tastan blog allows remote attackers to execute arbitrary sql commands via the id parameter in a goster kat action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-10-08 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in kategori.asp in furkan tastan blog allows remote attackers to execute arbitrary sql commands via the id parameter in a goster kat action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-10-08\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: phptpoint pharmacy management system suffers from a sql injection vulnerability in the index.php username parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-10-29 Last Modified Date: 2018-12-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: phptpoint pharmacy management system suffers from a sql injection vulnerability in the index.php username parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-10-29\nLast Modified Date: 2018-12-04", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-0808. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-04-09 Last Modified Date: 2019-05-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-0808.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-04-09\nLast Modified Date: 2019-05-08", "role": "assistant" } ]
CWE Code: 476 Vulnerability Type: sql_injection CVSS Score: 5.0 CWE Name: NULL Pointer Dereference Summary: sqlite 3.20.1 has a null pointer dereference in tablecolumnlist in shell.c because it fails to consider certain cases where `sqlite3_step(pstmt)==sqlite_row` is false and a data structure is never initialized. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2017-10-12 Last Modified Date: 2017-10-27
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: NULL Pointer Dereference.", "role": "user" }, { "content": "CWE Code: 476\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: NULL Pointer Dereference\nSummary: sqlite 3.20.1 has a null pointer dereference in tablecolumnlist in shell.c because it fails to consider certain cases where `sqlite3_step(pstmt)==sqlite_row` is false and a data structure is never initialized.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2017-10-12\nLast Modified Date: 2017-10-27", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: cross-site scripting (xss) vulnerability in the stickynote module before 7.x-1.1 for drupal allows remote authenticated users with edit stickynotes privileges to inject arbitrary web script or html via unspecified vecotrs. Access Authentication: SINGLE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2012-10-01 Last Modified Date: 2012-10-02
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: cross-site scripting (xss) vulnerability in the stickynote module before 7.x-1.1 for drupal allows remote authenticated users with edit stickynotes privileges to inject arbitrary web script or html via unspecified vecotrs.\nAccess Authentication: SINGLE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2012-10-01\nLast Modified Date: 2012-10-02", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: the graphics drivers subsystem in apple os x before 10.11.6 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-07-22 Last Modified Date: 2017-09-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the graphics drivers subsystem in apple os x before 10.11.6 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-22\nLast Modified Date: 2017-09-01", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 3.3 CWE Name: Permissions Privileges and Access Controls Summary: ibm i 7.4 users who have done a restore user profile (rstusrprf) on a system which has been configured with db2 mirror for i might have user profiles with elevated privileges caused by incorrect processing during a restore of multiple user profiles. a user with restore privileges could exploit this vulnerability to obtain elevated privileges on the restored system. ibm x-force id: 165592. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/NONE Published Date: 2019-08-29 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 3.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: ibm i 7.4 users who have done a restore user profile (rstusrprf) on a system which has been configured with db2 mirror for i might have user profiles with elevated privileges caused by incorrect processing during a restore of multiple user profiles. a user with restore privileges could exploit this vulnerability to obtain elevated privileges on the restored system. ibm x-force id: 165592.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2019-08-29\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 426 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Untrusted Search Path Summary: a dll hijacking vulnerability exists in the trend micro security's 2019 consumer family of products (v15) folder shield component and the standalone trend micro ransom buster (1.0) tool in which, if exploited, would allow an attacker to load a malicious dll, leading to elevated privileges. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-08-21 Last Modified Date: 2019-08-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Untrusted Search Path.", "role": "user" }, { "content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Untrusted Search Path\nSummary: a dll hijacking vulnerability exists in the trend micro security's 2019 consumer family of products (v15) folder shield component and the standalone trend micro ransom buster (1.0) tool in which, if exploited, would allow an attacker to load a malicious dll, leading to elevated privileges.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-21\nLast Modified Date: 2019-08-30", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Permissions Privileges and Access Controls Summary: aavmker4.sys in avast! home and professional 4.7 for windows does not properly validate input to ioctl 0xb2d60030, which allows local users to gain privileges via certain ioctl requests. Access Authentication: SINGLE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2008-04-02 Last Modified Date: 2018-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: aavmker4.sys in avast! home and professional 4.7 for windows does not properly validate input to ioctl 0xb2d60030, which allows local users to gain privileges via certain ioctl requests.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2008-04-02\nLast Modified Date: 2018-10-11", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 4.9 CWE Name: Improper Access Control Summary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of oracle vm virtualbox. cvss 3.0 base score 6.5 (availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:n/i:n/a:h). Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2019-01-16 Last Modified Date: 2019-06-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of oracle vm virtualbox. cvss 3.0 base score 6.5 (availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:n/i:n/a:h).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2019-01-16\nLast Modified Date: 2019-06-11", "role": "assistant" } ]
CWE Code: 287 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Improper Authentication Summary: libra file manager 1.18 and earlier allows remote attackers to bypass authentication and gain privileges by setting the user and pass cookies to 1. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-08-21 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Authentication.", "role": "user" }, { "content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Improper Authentication\nSummary: libra file manager 1.18 and earlier allows remote attackers to bypass authentication and gain privileges by setting the user and pass cookies to 1.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-08-21\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Permissions Privileges and Access Controls Summary: sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2013-03-05 Last Modified Date: 2016-11-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-03-05\nLast Modified Date: 2016-11-28", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 3.5 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: microsoft excel services on microsoft sharepoint server 2010 sp1 and sp2, microsoft excel web apps 2010 sp2, microsoft office web apps 2010 sp2, microsoft office web apps server 2013 sp1 and office online server allows remote attackers to perform cross-site scripting and run script with local user privileges via a crafted request, aka "microsoft office xss elevation of privilege vulnerability." Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2017-04-12 Last Modified Date: 2017-04-20
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: microsoft excel services on microsoft sharepoint server 2010 sp1 and sp2, microsoft excel web apps 2010 sp2, microsoft office web apps 2010 sp2, microsoft office web apps server 2013 sp1 and office online server allows remote attackers to perform cross-site scripting and run script with local user privileges via a crafted request, aka \"microsoft office xss elevation of privilege vulnerability.\"\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2017-04-12\nLast Modified Date: 2017-04-20", "role": "assistant" } ]
CWE Code: 732 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Incorrect Permission Assignment for Critical Resource Summary: an issue was discovered in capmon access manager 5.4.1.1005. an unprivileged user can read the cal_whitelist table in the custom app launcher (cal) database, and potentially gain privileges by placing a trojan horse program at an app pathname. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-03-15 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.", "role": "user" }, { "content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: an issue was discovered in capmon access manager 5.4.1.1005. an unprivileged user can read the cal_whitelist table in the custom app launcher (cal) database, and potentially gain privileges by placing a trojan horse program at an app pathname.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-03-15\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in includes/rating.php in 2z project 0.9.5 allows remote attackers to execute arbitrary sql commands via the rating parameter to index.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-05-30 Last Modified Date: 2018-10-16
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in includes/rating.php in 2z project 0.9.5 allows remote attackers to execute arbitrary sql commands via the rating parameter to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-05-30\nLast Modified Date: 2018-10-16", "role": "assistant" } ]
CWE Code: 281 Vulnerability Type: privilege_escalation CVSS Score: 6.2 CWE Name: Improper Preservation of Permissions Summary: win32k in microsoft windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "win32k elevation of privilege vulnerability". this cve id is unique from cve-2017-8577, cve-2017-8578, cve-2017-8581, and cve-2017-8467. Access Authentication: NONE Access Complexity: HIGH Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-07-11 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Preservation of Permissions.", "role": "user" }, { "content": "CWE Code: 281\nVulnerability Type: privilege_escalation\nCVSS Score: 6.2\nCWE Name: Improper Preservation of Permissions\nSummary: win32k in microsoft windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability\". this cve id is unique from cve-2017-8577, cve-2017-8578, cve-2017-8581, and cve-2017-8467.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-07-11\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the web gui in ibm tivoli netcool/omnibus before 7.3.0.4 allows remote attackers to execute arbitrary sql commands via "dynamic sql parameters." Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-03-09 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the web gui in ibm tivoli netcool/omnibus before 7.3.0.4 allows remote attackers to execute arbitrary sql commands via \"dynamic sql parameters.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-03-09\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 6.6 CWE Name: Improper Input Validation Summary: an exploitable privilege escalation vulnerability exists in the helper service cleanmymac x, version 4.20, due to improper updating. the application failed to remove the vulnerable components upon upgrading to the latest version, leaving the user open to attack. a user with local access can use this vulnerability to modify the file system as root. an attacker would need local access to the machine for a successful exploit. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/COMPLETE/COMPLETE Published Date: 2019-03-21 Last Modified Date: 2019-03-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.6\nCWE Name: Improper Input Validation\nSummary: an exploitable privilege escalation vulnerability exists in the helper service cleanmymac x, version 4.20, due to improper updating. the application failed to remove the vulnerable components upon upgrading to the latest version, leaving the user open to attack. a user with local access can use this vulnerability to modify the file system as root. an attacker would need local access to the machine for a successful exploit.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/COMPLETE/COMPLETE\nPublished Date: 2019-03-21\nLast Modified Date: 2019-03-22", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in lista_anexos.php in webchamado 1.1 allows remote attackers to execute arbitrary sql commands via the tsk_id parameter. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-06-30 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in lista_anexos.php in webchamado 1.1 allows remote attackers to execute arbitrary sql commands via the tsk_id parameter.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-30\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 415 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Double Free Summary: the dccp_rcv_state_process function in net/dccp/input.c in the linux kernel through 4.9.11 mishandles dccp_pkt_request packet data structures in the listen state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an ipv6_recvpktinfo setsockopt system call. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-02-18 Last Modified Date: 2018-07-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Double Free.", "role": "user" }, { "content": "CWE Code: 415\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Double Free\nSummary: the dccp_rcv_state_process function in net/dccp/input.c in the linux kernel through 4.9.11 mishandles dccp_pkt_request packet data structures in the listen state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an ipv6_recvpktinfo setsockopt system call.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-02-18\nLast Modified Date: 2018-07-19", "role": "assistant" } ]
CWE Code: 281 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Preservation of Permissions Summary: the report-viewing feature in pearson vue certiport console 8 and iqsystem 7 before 2018-06-26 mishandles child processes and consequently launches internet explorer or microsoft edge as administrator, which allows local users to gain privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-08-03 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Preservation of Permissions.", "role": "user" }, { "content": "CWE Code: 281\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Preservation of Permissions\nSummary: the report-viewing feature in pearson vue certiport console 8 and iqsystem 7 before 2018-06-26 mishandles child processes and consequently launches internet explorer or microsoft edge as administrator, which allows local users to gain privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-08-03\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: icy phoenix 2.2.0.105 allows sql injection via an unapprove request to admin_kb_art.php or the order parameter to admin_jr_admin.php, related to functions_kb.php. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-01-14 Last Modified Date: 2018-02-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: icy phoenix 2.2.0.105 allows sql injection via an unapprove request to admin_kb_art.php or the order parameter to admin_jr_admin.php, related to functions_kb.php.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-01-14\nLast Modified Date: 2018-02-01", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the folder::findormake method in silverstripe 2.3.x before 2.3.12 and 2.4.x before 2.4.6 allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2012-09-17 Last Modified Date: 2012-09-18
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the folder::findormake method in silverstripe 2.3.x before 2.3.12 and 2.4.x before 2.4.6 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-09-17\nLast Modified Date: 2012-09-18", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in category.php in ebay clone 2009 allows remote attackers to execute arbitrary sql commands via the cate_id parameter in a list action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-07-10 Last Modified Date: 2009-07-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in category.php in ebay clone 2009 allows remote attackers to execute arbitrary sql commands via the cate_id parameter in a list action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-07-10\nLast Modified Date: 2009-07-13", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in the sigsiu online business index 2 (sobi2, com_sobi2) 2.5.3 component for joomla! and mambo allows remote attackers to execute arbitrary sql commands via the catid parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-02-06 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the sigsiu online business index 2 (sobi2, com_sobi2) 2.5.3 component for joomla! and mambo allows remote attackers to execute arbitrary sql commands via the catid parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-06\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-0960, cve-2019-1014. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-06-12 Last Modified Date: 2019-06-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-0960, cve-2019-1014.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-12\nLast Modified Date: 2019-06-13", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Access Control Summary: a vulnerability in the logic that handles access control to one of the hardware components in cisco's proprietary secure boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. this vulnerability affects multiple cisco products that support hardware-based secure boot functionality. the vulnerability is due to an improper check on the area of code that manages on-premise updates to a field programmable gate array (fpga) part of the secure boot hardware implementation. an attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the fpga. a successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the secure boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. an attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: have privileged administrative access to the device. be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. develop or have access to a platform-specific exploit. an attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-05-13 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Access Control\nSummary: a vulnerability in the logic that handles access control to one of the hardware components in cisco's proprietary secure boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. this vulnerability affects multiple cisco products that support hardware-based secure boot functionality. the vulnerability is due to an improper check on the area of code that manages on-premise updates to a field programmable gate array (fpga) part of the secure boot hardware implementation. an attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the fpga. a successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the secure boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. an attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: have privileged administrative access to the device. be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. develop or have access to a platform-specific exploit. an attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-05-13\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in asp-dev xm diary allow remote attackers to execute arbitrary sql commands via the (1) id parameter to diary_view.asp or (2) view_date parameter to default.asp. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2012-07-25 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in asp-dev xm diary allow remote attackers to execute arbitrary sql commands via the (1) id parameter to diary_view.asp or (2) view_date parameter to default.asp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-07-25\nLast Modified Date: 2017-08-29", "role": "assistant" } ]