text
stringlengths
365
3.97k
conversations
listlengths
3
3
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: heap-based buffer overflow in the pavtpk.sys kernel mode driver of panda security 2014 products before hft131306s24_r1 allows local users to gain privileges via a crafted argument to a 0x222008 ioctl call. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2014-08-26 Last Modified Date: 2018-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: heap-based buffer overflow in the pavtpk.sys kernel mode driver of panda security 2014 products before hft131306s24_r1 allows local users to gain privileges via a crafted argument to a 0x222008 ioctl call.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-08-26\nLast Modified Date: 2018-10-09", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Information Exposure Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: performance schema). supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all mysql server accessible data. cvss 3.0 base score 4.9 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:h/i:n/a:n). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2018-01-18 Last Modified Date: 2018-03-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: performance schema). supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all mysql server accessible data. cvss 3.0 base score 4.9 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:h/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-01-18\nLast Modified Date: 2018-03-28", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: the driver of honor 5c,honor 6x huawei smart phones with software of versions earlier than nem-al10c00b356, versions earlier than berlin-l21hnc432b360 have a buffer overflow vulnerability due to the lack of parameter validation. an attacker tricks a user into installing a malicious app which has the root privilege of the android system, the app can send a specific parameter to the driver of the smart phone, causing a system reboot or arbitrary code execution. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-11-22 Last Modified Date: 2017-12-06
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the driver of honor 5c,honor 6x huawei smart phones with software of versions earlier than nem-al10c00b356, versions earlier than berlin-l21hnc432b360 have a buffer overflow vulnerability due to the lack of parameter validation. an attacker tricks a user into installing a malicious app which has the root privilege of the android system, the app can send a specific parameter to the driver of the smart phone, causing a system reboot or arbitrary code execution.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-11-22\nLast Modified Date: 2017-12-06", "role": "assistant" } ]
CWE Code: 787 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Out-of-bounds Write Summary: in rw_t3t_handle_get_sc_poll_rsp of rw_t3t.cc, there is a possible out-of-bound write due to a missing bounds check. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is needed for exploitation.product: androidversions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9android id: a-120499324 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-06-19 Last Modified Date: 2019-06-20
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Write.", "role": "user" }, { "content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Out-of-bounds Write\nSummary: in rw_t3t_handle_get_sc_poll_rsp of rw_t3t.cc, there is a possible out-of-bound write due to a missing bounds check. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is needed for exploitation.product: androidversions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9android id: a-120499324\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-19\nLast Modified Date: 2019-06-20", "role": "assistant" } ]
CWE Code: 798 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Use of Hard-coded Credentials Summary: the at&t u-verse 9.2.2h0d83 firmware for the arris nvg589 and nvg599 devices, when ip passthrough mode is not used, configures ssh-permanent-enable wan ssh logins to the remotessh account with the 5sap9i26 password, which allows remote attackers to access a "terminal shell v1.0" service, and subsequently obtain unrestricted root privileges, by establishing an ssh session and then entering certain shell metacharacters and busybox commands. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-09-03 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Use of Hard-coded Credentials.", "role": "user" }, { "content": "CWE Code: 798\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Use of Hard-coded Credentials\nSummary: the at&t u-verse 9.2.2h0d83 firmware for the arris nvg589 and nvg599 devices, when ip passthrough mode is not used, configures ssh-permanent-enable wan ssh logins to the remotessh account with the 5sap9i26 password, which allows remote attackers to access a \"terminal shell v1.0\" service, and subsequently obtain unrestricted root privileges, by establishing an ssh session and then entering certain shell metacharacters and busybox commands.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-09-03\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 78 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Summary: a server-side template injection issue was discovered in crafter cms 3.0.18. attackers with developer privileges may execute os commands by creating/editing a template file (.ftl filetype) that triggers a call to freemarker.template.utility.execute in the freemarker library during rendering of a web page. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-12-06 Last Modified Date: 2018-12-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').", "role": "user" }, { "content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: a server-side template injection issue was discovered in crafter cms 3.0.18. attackers with developer privileges may execute os commands by creating/editing a template file (.ftl filetype) that triggers a call to freemarker.template.utility.execute in the freemarker library during rendering of a web page.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-12-06\nLast Modified Date: 2018-12-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: eleix openhacker version 0.1.47 is vulnerable to an sql injection in the account registration and login component resulting in information disclosure and remote code execution Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-01-02 Last Modified Date: 2018-01-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: eleix openhacker version 0.1.47 is vulnerable to an sql injection in the account registration and login component resulting in information disclosure and remote code execution\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-01-02\nLast Modified Date: 2018-01-11", "role": "assistant" } ]
CWE Code: 732 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Incorrect Permission Assignment for Critical Resource Summary: improper directory permissions in the installer for the intel media server studio may allow unprivileged users to potentially enable an escalation of privilege via local access. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-11-14 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.", "role": "user" }, { "content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: improper directory permissions in the installer for the intel media server studio may allow unprivileged users to potentially enable an escalation of privilege via local access.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-11-14\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Access Control Summary: applemobilefileintegrity in apple ios before 9.2 and tvos before 9.1 does not prevent changes to access-control structures, which allows attackers to execute arbitrary code in a privileged context via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-12-11 Last Modified Date: 2019-03-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Access Control\nSummary: applemobilefileintegrity in apple ios before 9.2 and tvos before 9.1 does not prevent changes to access-control structures, which allows attackers to execute arbitrary code in a privileged context via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-12-11\nLast Modified Date: 2019-03-08", "role": "assistant" } ]
CWE Code: 362 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Summary: race condition in the tee (sys_tee) system call in the linux kernel 2.6.17 through 2.6.17.6 might allow local users to cause a denial of service (system crash), obtain sensitive information (kernel memory contents), or gain privileges via unspecified vectors related to a potentially dropped ipipe lock during a race between two pipe readers. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2007-09-18 Last Modified Date: 2008-09-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').", "role": "user" }, { "content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: race condition in the tee (sys_tee) system call in the linux kernel 2.6.17 through 2.6.17.6 might allow local users to cause a denial of service (system crash), obtain sensitive information (kernel memory contents), or gain privileges via unspecified vectors related to a potentially dropped ipipe lock during a race between two pipe readers.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2007-09-18\nLast Modified Date: 2008-09-05", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in loudblog/ajax.php in loudblog 0.8.0a and earlier allows remote authenticated users to execute arbitrary sql commands via the colpick parameter in a singleread action. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-02-06 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in loudblog/ajax.php in loudblog 0.8.0a and earlier allows remote authenticated users to execute arbitrary sql commands via the colpick parameter in a singleread action.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-06\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: multiple buffer overflow issues have been identified in alpha5 smart loader: all versions prior to 4.2. an attacker could use specially crafted project files to overflow the buffer and execute code under the privileges of the application. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-08-20 Last Modified Date: 2019-09-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: multiple buffer overflow issues have been identified in alpha5 smart loader: all versions prior to 4.2. an attacker could use specially crafted project files to overflow the buffer and execute code under the privileges of the application.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-20\nLast Modified Date: 2019-09-05", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in links.php in appalachian state university phpwebsite allows remote attackers to execute arbitrary sql commands via the cid parameter in a viewlink action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-02-25 Last Modified Date: 2018-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in links.php in appalachian state university phpwebsite allows remote attackers to execute arbitrary sql commands via the cid parameter in a viewlink action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-25\nLast Modified Date: 2018-10-11", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 4.9 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: in the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a power host due to a missing processor feature check and an erroneous use of transactional memory (tm) instructions in the core dump path, leading to a denial of service. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2018-03-27 Last Modified Date: 2018-05-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: in the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a power host due to a missing processor feature check and an erroneous use of transactional memory (tm) instructions in the core dump path, leading to a denial of service.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2018-03-27\nLast Modified Date: 2018-05-10", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in backlinkspider allows remote attackers to execute arbitrary sql commands via the cat_id parameter to a site-specific component name such as link.php or backlinkspider.php. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-05-07 Last Modified Date: 2018-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in backlinkspider allows remote attackers to execute arbitrary sql commands via the cat_id parameter to a site-specific component name such as link.php or backlinkspider.php.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-07\nLast Modified Date: 2018-10-11", "role": "assistant" } ]
CWE Code: 426 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Untrusted Search Path Summary: bestxsoftware best free keylogger before 6.0.0 allows local users to gain privileges via a trojan horse "%programfiles%\bfk 5.2.9\syscrb.exe" file because of insecure permissions for the builtin\users group. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-11-19 Last Modified Date: 2019-06-21
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Untrusted Search Path.", "role": "user" }, { "content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Untrusted Search Path\nSummary: bestxsoftware best free keylogger before 6.0.0 allows local users to gain privileges via a trojan horse \"%programfiles%\\bfk 5.2.9\\syscrb.exe\" file because of insecure permissions for the builtin\\users group.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-11-19\nLast Modified Date: 2019-06-21", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Privilege Management Summary: insufficient access control in ilp60x64.sys driver for intel(r) ethernet 700 series controllers before version 1.33.0.0 may allow a privileged user to potentially enable escalation of privilege via local access. Access Authentication: NONE Access Complexity: UNKNOWN Access Vector: UNKNOWN Impact (C/I/A): NONE/NONE/NONE Published Date: 2019-11-14 Last Modified Date: 2019-11-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Privilege Management\nSummary: insufficient access control in ilp60x64.sys driver for intel(r) ethernet 700 series controllers before version 1.33.0.0 may allow a privileged user to potentially enable escalation of privilege via local access.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-14\nLast Modified Date: 2019-11-14", "role": "assistant" } ]
CWE Code: 532 Vulnerability Type: privilege_escalation CVSS Score: 5.0 CWE Name: Inclusion of Sensitive Information in Log Files Summary: an issue was discovered in moxa edr-810 industrial secure router. by accessing a specific uniform resource locator (url) on the web server, a malicious user is able to access configuration and log files (privilege escalation). Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2017-02-13 Last Modified Date: 2017-02-23
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Inclusion of Sensitive Information in Log Files.", "role": "user" }, { "content": "CWE Code: 532\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Inclusion of Sensitive Information in Log Files\nSummary: an issue was discovered in moxa edr-810 industrial secure router. by accessing a specific uniform resource locator (url) on the web server, a malicious user is able to access configuration and log files (privilege escalation).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-02-13\nLast Modified Date: 2017-02-23", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: a vulnerability was reported in various bios versions of older thinkpad systems that could allow a user with administrative privileges or physical access the ability to update the embedded controller with unsigned firmware. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-08-19 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: a vulnerability was reported in various bios versions of older thinkpad systems that could allow a user with administrative privileges or physical access the ability to update the embedded controller with unsigned firmware.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-08-19\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in modx 0.9.6.2 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the searchid parameter. note: some of these details are obtained from third party information. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-01-22 Last Modified Date: 2017-08-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in modx 0.9.6.2 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the searchid parameter. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-01-22\nLast Modified Date: 2017-08-08", "role": "assistant" } ]
CWE Code: 426 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Untrusted Search Path Summary: untrusted search path vulnerability in security setup tool all versions allows an attacker to gain privileges via a trojan horse dll in an unspecified directory. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-08-29 Last Modified Date: 2017-08-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Untrusted Search Path.", "role": "user" }, { "content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in security setup tool all versions allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-08-29\nLast Modified Date: 2017-08-30", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: an issue was discovered in ampache through 3.9.1. the search engine is affected by a sql injection, so any user able to perform lib/class/search.class.php searches (even guest users) can dump any data contained in the database (sessions, hashed passwords, etc.). this may lead to a full compromise of admin accounts, when combined with the weak password generator algorithm used in the lostpassword functionality. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-08-22 Last Modified Date: 2019-08-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in ampache through 3.9.1. the search engine is affected by a sql injection, so any user able to perform lib/class/search.class.php searches (even guest users) can dump any data contained in the database (sessions, hashed passwords, etc.). this may lead to a full compromise of admin accounts, when combined with the weak password generator algorithm used in the lostpassword functionality.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-22\nLast Modified Date: 2019-08-30", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 5.5 CWE Name: Improper Privilege Management Summary: vulnerability in the oracle flexcube universal banking component of oracle financial services applications (subcomponent: infrastructure). supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0 and 12.3.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle flexcube universal banking. successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of oracle flexcube universal banking accessible data as well as unauthorized read access to a subset of oracle flexcube universal banking accessible data. cvss 3.0 base score 5.4 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:l/a:n). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/NONE Published Date: 2017-08-08 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Privilege Management\nSummary: vulnerability in the oracle flexcube universal banking component of oracle financial services applications (subcomponent: infrastructure). supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0 and 12.3.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle flexcube universal banking. successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of oracle flexcube universal banking accessible data as well as unauthorized read access to a subset of oracle flexcube universal banking accessible data. cvss 3.0 base score 5.4 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:l/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2017-08-08\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Permissions Privileges and Access Controls Summary: internal/views/addusers.php in schben adive 2.0.7 allows remote unprivileged users (editor or developer) to create an administrator account via admin/user/add, as demonstrated by a python poc script. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-08-06 Last Modified Date: 2019-08-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: internal/views/addusers.php in schben adive 2.0.7 allows remote unprivileged users (editor or developer) to create an administrator account via admin/user/add, as demonstrated by a python poc script.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-06\nLast Modified Date: 2019-08-14", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: an issue was discovered in idreamsoft icms through 7.0.7. sql injection exists via the pid array parameter in an admincp.php?app=tag&do=save&frame=iphp request. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-04-10 Last Modified Date: 2018-04-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in idreamsoft icms through 7.0.7. sql injection exists via the pid array parameter in an admincp.php?app=tag&do=save&frame=iphp request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-04-10\nLast Modified Date: 2018-04-17", "role": "assistant" } ]
CWE Code: 732 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Incorrect Permission Assignment for Critical Resource Summary: the compilation daemon in scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${user:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-11-15 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.", "role": "user" }, { "content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: the compilation daemon in scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${user:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-11-15\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Improper Privilege Management Summary: sel compass version 3.0.5.1 and prior allows all users full access to the sel compass directory, which may allow modification or overwriting of files within the compass installation folder, resulting in escalation of privilege and/or malicious code execution. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-07-24 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Privilege Management\nSummary: sel compass version 3.0.5.1 and prior allows all users full access to the sel compass directory, which may allow modification or overwriting of files within the compass installation folder, resulting in escalation of privilege and/or malicious code execution.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-07-24\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Permissions Privileges and Access Controls Summary: an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1087, cve-2019-1088. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-07-15 Last Modified Date: 2019-07-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege exists in windows audio service, aka 'windows audio service elevation of privilege vulnerability'. this cve id is unique from cve-2019-1087, cve-2019-1088.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-15\nLast Modified Date: 2019-07-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the authentication form in the integrated web server in the data management server (dms) before 1.4.3 in samsung integrated management system allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-05-09 Last Modified Date: 2011-05-27
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the authentication form in the integrated web server in the data management server (dms) before 1.4.3 in samsung integrated management system allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-05-09\nLast Modified Date: 2011-05-27", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 5.6 CWE Name: Improper Input Validation Summary: the (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain linux kernel backport in the linux package before 3.2.73-2+deb7u3 on debian wheezy and the kernel package before 3.10.0-229.26.2 on red hat enterprise linux (rhel) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "i/o vector array overrun." note: this vulnerability exists because of an incorrect fix for cve-2015-1805. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/NONE/COMPLETE Published Date: 2016-04-27 Last Modified Date: 2016-12-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 5.6\nCWE Name: Improper Input Validation\nSummary: the (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain linux kernel backport in the linux package before 3.2.73-2+deb7u3 on debian wheezy and the kernel package before 3.10.0-229.26.2 on red hat enterprise linux (rhel) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an \"i/o vector array overrun.\" note: this vulnerability exists because of an incorrect fix for cve-2015-1805.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/COMPLETE\nPublished Date: 2016-04-27\nLast Modified Date: 2016-12-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the productbook (com_productbook) component 1.0.4 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php. note: some of these details are obtained from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-03-23 Last Modified Date: 2010-03-23
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the productbook (com_productbook) component 1.0.4 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-23\nLast Modified Date: 2010-03-23", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Improper Access Control Summary: files or directories accessible to external parties in mcafee data loss prevention (dlpe) for windows 11.x prior to 11.3.0 allows authenticated user to redirect dlpe log files to arbitrary locations via incorrect access control applied to the dlpe log folder allowing privileged users to create symbolic links. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-07-24 Last Modified Date: 2019-07-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Access Control\nSummary: files or directories accessible to external parties in mcafee data loss prevention (dlpe) for windows 11.x prior to 11.3.0 allows authenticated user to redirect dlpe log files to arbitrary locations via incorrect access control applied to the dlpe log folder allowing privileged users to create symbolic links.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-24\nLast Modified Date: 2019-07-25", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in default.asp in site2nite allow remote attackers to execute arbitrary sql commands via the (1) txtusername and (2) txtpassword parameters. note: some of these details are obtained from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-02-14 Last Modified Date: 2018-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in default.asp in site2nite allow remote attackers to execute arbitrary sql commands via the (1) txtusername and (2) txtpassword parameters. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-14\nLast Modified Date: 2018-10-15", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Privilege Management Summary: in the servicemanager::add function in the hardware service manager, there is an insecure permissions check based on the pid of the caller which could allow an application or service to replace a hal service with its own service. this could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 8.0, 8.1. android id: a-68217907. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-01-12 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Privilege Management\nSummary: in the servicemanager::add function in the hardware service manager, there is an insecure permissions check based on the pid of the caller which could allow an application or service to replace a hal service with its own service. this could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 8.0, 8.1. android id: a-68217907.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-01-12\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in account.asp in active photo gallery 6.2 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-12-17 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in account.asp in active photo gallery 6.2 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-17\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows server 2012, and windows rt does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "win32k window handle vulnerability." Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2013-05-15 Last Modified Date: 2019-02-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows server 2012, and windows rt does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka \"win32k window handle vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-05-15\nLast Modified Date: 2019-02-26", "role": "assistant" } ]
CWE Code: 476 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: NULL Pointer Dereference Summary: appleefiruntime in apple os x before 10.12 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (null pointer dereference) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-09-25 Last Modified Date: 2017-07-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: NULL Pointer Dereference.", "role": "user" }, { "content": "CWE Code: 476\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: NULL Pointer Dereference\nSummary: appleefiruntime in apple os x before 10.12 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (null pointer dereference) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-09-25\nLast Modified Date: 2017-07-30", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in zero_transact_article.php in zerocms 1.0 allows remote attackers to execute arbitrary sql commands via the article_id parameter in a submit comment action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2014-07-09 Last Modified Date: 2015-09-02
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in zero_transact_article.php in zerocms 1.0 allows remote attackers to execute arbitrary sql commands via the article_id parameter in a submit comment action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-07-09\nLast Modified Date: 2015-09-02", "role": "assistant" } ]
CWE Code: 59 Vulnerability Type: privilege_escalation CVSS Score: 3.3 CWE Name: Improper Link Resolution Before File Access ('Link Following') Summary: vccleaner in videocache 1.9.2 allows local users with squid proxy user privileges to overwrite arbitrary files via a symlink attack on /var/log/videocache/vccleaner.log. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): NONE/PARTIAL/PARTIAL Published Date: 2009-12-29 Last Modified Date: 2018-10-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Link Resolution Before File Access ('Link Following').", "role": "user" }, { "content": "CWE Code: 59\nVulnerability Type: privilege_escalation\nCVSS Score: 3.3\nCWE Name: Improper Link Resolution Before File Access ('Link Following')\nSummary: vccleaner in videocache 1.9.2 allows local users with squid proxy user privileges to overwrite arbitrary files via a symlink attack on /var/log/videocache/vccleaner.log.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/PARTIAL/PARTIAL\nPublished Date: 2009-12-29\nLast Modified Date: 2018-10-10", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in search_result.asp in pre projects pre e-learning portal allows remote attackers to execute arbitrary sql commands via the course_id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-03-10 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in search_result.asp in pre projects pre e-learning portal allows remote attackers to execute arbitrary sql commands via the course_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-10\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Permissions Privileges and Access Controls Summary: in android before 2018-04-05 or earlier security patch level on qualcomm snapdragon mobile and small cell soc fsm9055, mdm9635m, sd 400, and sd 800, improper input validation in tzbsp_ocmem can cause privilege escalation. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-04-18 Last Modified Date: 2018-05-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: in android before 2018-04-05 or earlier security patch level on qualcomm snapdragon mobile and small cell soc fsm9055, mdm9635m, sd 400, and sd 800, improper input validation in tzbsp_ocmem can cause privilege escalation.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-04-18\nLast Modified Date: 2018-05-09", "role": "assistant" } ]
CWE Code: 310 Vulnerability Type: privilege_escalation CVSS Score: 3.5 CWE Name: Cryptographic Issues Summary: mit kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject rc4 key-derivation checksums, which might allow remote authenticated users to forge a (1) ad-signedpath or (2) ad-kdc-issued signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2010-12-02 Last Modified Date: 2018-10-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Cryptographic Issues.", "role": "user" }, { "content": "CWE Code: 310\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Cryptographic Issues\nSummary: mit kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject rc4 key-derivation checksums, which might allow remote authenticated users to forge a (1) ad-signedpath or (2) ad-kdc-issued signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2010-12-02\nLast Modified Date: 2018-10-10", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: shareet - photo sharing social network 1.0 allows sql injection via the photo parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-10-31 Last Modified Date: 2017-11-18
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: shareet - photo sharing social network 1.0 allows sql injection via the photo parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-10-31\nLast Modified Date: 2017-11-18", "role": "assistant" } ]
CWE Code: 732 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Incorrect Permission Assignment for Critical Resource Summary: nvidia gpu display driver r378 contains a vulnerability in the kernel mode layer handler where improper access control may lead to denial of service or possible escalation of privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-02-15 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.", "role": "user" }, { "content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: nvidia gpu display driver r378 contains a vulnerability in the kernel mode layer handler where improper access control may lead to denial of service or possible escalation of privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-02-15\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 9.0 CWE Name: Improper Privilege Management Summary: ubiquiti networks edgeos version 1.9.1.1 and prior suffer from an improper privilege management vulnerability due to the lack of protection of the file system leading to sensitive information being exposed. an attacker with access to an operator (read-only) account could escalate privileges to admin (root) access in the system. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-03-22 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Privilege Management\nSummary: ubiquiti networks edgeos version 1.9.1.1 and prior suffer from an improper privilege management vulnerability due to the lack of protection of the file system leading to sensitive information being exposed. an attacker with access to an operator (read-only) account could escalate privileges to admin (root) access in the system.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-03-22\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 3.5 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: tine 2.0 version 2017.02.4 is vulnerable to xss in the addressbook resulting code execution and privilege escalation Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2017-11-17 Last Modified Date: 2017-11-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: tine 2.0 version 2017.02.4 is vulnerable to xss in the addressbook resulting code execution and privilege escalation\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2017-11-17\nLast Modified Date: 2017-11-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: a sql injection issue was discovered in the mail masta (aka mail-masta) plugin 1.0 for wordpress. this affects /inc/lists/view-list.php (requires authentication to wordpress admin) with the get parameter: filter_list. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-02-21 Last Modified Date: 2019-03-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection issue was discovered in the mail masta (aka mail-masta) plugin 1.0 for wordpress. this affects /inc/lists/view-list.php (requires authentication to wordpress admin) with the get parameter: filter_list.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-02-21\nLast Modified Date: 2019-03-13", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in the kunena component before 3.0.6 for joomla! allow remote authenticated users to execute arbitrary sql commands via the index value in an array parameter, as demonstrated by the topics[] parameter in an unfavorite action to index.php. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2014-11-26 Last Modified Date: 2014-12-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the kunena component before 3.0.6 for joomla! allow remote authenticated users to execute arbitrary sql commands via the index value in an array parameter, as demonstrated by the topics[] parameter in an unfavorite action to index.php.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-11-26\nLast Modified Date: 2014-12-05", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Improper Input Validation Summary: a security bypass vulnerability exists in magento 2.2 prior to 2.2.10, magento 2.3 prior to 2.3.3 or 2.3.2-p1. a user with privileges to generate sitemaps can bypass configuration that restricts directory access. the bypass allows overwrite of a subset of configuration files which can lead to denial of service. Access Authentication: NONE Access Complexity: UNKNOWN Access Vector: UNKNOWN Impact (C/I/A): NONE/NONE/NONE Published Date: 2019-11-06 Last Modified Date: 2019-11-06
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Input Validation\nSummary: a security bypass vulnerability exists in magento 2.2 prior to 2.2.10, magento 2.3 prior to 2.3.3 or 2.3.2-p1. a user with privileges to generate sitemaps can bypass configuration that restricts directory access. the bypass allows overwrite of a subset of configuration files which can lead to denial of service.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-06\nLast Modified Date: 2019-11-06", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: library management system 1.0 has sql injection via the "search for books" screen. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-11-16 Last Modified Date: 2018-12-18
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: library management system 1.0 has sql injection via the \"search for books\" screen.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-11-16\nLast Modified Date: 2018-12-18", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in index.php in the xm-memberstats (xmmemberstats) 2.0e module for xoops allow remote attackers to execute arbitrary sql commands via the (1) letter or (2) sortby parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-02-28 Last Modified Date: 2008-09-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in the xm-memberstats (xmmemberstats) 2.0e module for xoops allow remote attackers to execute arbitrary sql commands via the (1) letter or (2) sortby parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-28\nLast Modified Date: 2008-09-05", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 5.5 CWE Name: Improper Access Control Summary: insufficient enforcement of user access controls in magento 2.1 prior to 2.1.18, magento 2.2 prior to 2.2.9, magento 2.3 prior to 2.3.2 could enable a low-privileged user to make unauthorized environment configuration changes. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/PARTIAL Published Date: 2019-08-02 Last Modified Date: 2019-08-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Access Control\nSummary: insufficient enforcement of user access controls in magento 2.1 prior to 2.1.18, magento 2.2 prior to 2.2.9, magento 2.3 prior to 2.3.2 could enable a low-privileged user to make unauthorized environment configuration changes.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/PARTIAL\nPublished Date: 2019-08-02\nLast Modified Date: 2019-08-09", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Privilege Management Summary: an elevation of privilege vulnerability exists when windows cloudstore improperly handles file discretionary access control list (dacl), aka 'microsoft windows cloudstore elevation of privilege vulnerability'. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-10-10 Last Modified Date: 2019-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Privilege Management\nSummary: an elevation of privilege vulnerability exists when windows cloudstore improperly handles file discretionary access control list (dacl), aka 'microsoft windows cloudstore elevation of privilege vulnerability'.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-10-10\nLast Modified Date: 2019-10-15", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Improper Input Validation Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: security: roles). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2019-04-23 Last Modified Date: 2019-08-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Input Validation\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: security: roles). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-04-23\nLast Modified Date: 2019-08-14", "role": "assistant" } ]
CWE Code: 787 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Out-of-bounds Write Summary: in ixheaacd_individual_ch_stream of ixheaacd_channel.c there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-9. android id: a-112551874 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-11-14 Last Modified Date: 2018-12-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Write.", "role": "user" }, { "content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Out-of-bounds Write\nSummary: in ixheaacd_individual_ch_stream of ixheaacd_channel.c there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-9. android id: a-112551874\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-11-14\nLast Modified Date: 2018-12-14", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in philboard_forum.asp in husrevforum 1.0.1 allows remote attackers to execute arbitrary sql commands via the forumid parameter. note: it was later reported that 2.0.1 is also affected. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-07-18 Last Modified Date: 2018-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in philboard_forum.asp in husrevforum 1.0.1 allows remote attackers to execute arbitrary sql commands via the forumid parameter. note: it was later reported that 2.0.1 is also affected.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-07-18\nLast Modified Date: 2018-10-15", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: xenfcoresharp before 2019-07-16 allows sql injection in web/verify.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-08-26 Last Modified Date: 2019-08-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: xenfcoresharp before 2019-07-16 allows sql injection in web/verify.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-26\nLast Modified Date: 2019-08-30", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in includes/picture.class.php in galette 0.63, 0.63.1, 0.63.2, 0.63.3, and 0.64rc1 allows remote attackers to execute arbitrary sql commands via the id_adh parameter to picture.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2012-05-21 Last Modified Date: 2012-05-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in includes/picture.class.php in galette 0.63, 0.63.1, 0.63.2, 0.63.3, and 0.64rc1 allows remote attackers to execute arbitrary sql commands via the id_adh parameter to picture.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-05-21\nLast Modified Date: 2012-05-22", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 5.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: dl/dl_sendmail.php in zzcms 8.3 has sql injection via the sql parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2018-08-06 Last Modified Date: 2018-10-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: dl/dl_sendmail.php in zzcms 8.3 has sql injection via the sql parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-08-06\nLast Modified Date: 2018-10-04", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in searchresult.php in softbiz link directory script allows remote attackers to execute arbitrary sql commands via the sbcat_id parameter, a related issue to cve-2007-5449. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-11-15 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in searchresult.php in softbiz link directory script allows remote attackers to execute arbitrary sql commands via the sbcat_id parameter, a related issue to cve-2007-5449.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-11-15\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in kervinet forum 1.1 and earlier allow remote attackers to execute arbitrary sql commands via (1) an enter_parol cookie to index.php in an auto action or (2) the topic parameter to message.php. note: vector 2 can be leveraged for a cross-site scripting (xss) attack. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-07-05 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in kervinet forum 1.1 and earlier allow remote attackers to execute arbitrary sql commands via (1) an enter_parol cookie to index.php in an auto action or (2) the topic parameter to message.php. note: vector 2 can be leveraged for a cross-site scripting (xss) attack.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-07-05\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 427 Vulnerability Type: privilege_escalation CVSS Score: 6.2 CWE Name: Uncontrolled Search Path Element Summary: an uncontrolled search path vulnerability is applicable to the following: dell update package (dup) framework file versions prior to 19.1.0.413, and framework file versions prior to 103.4.6.69 used in dell emc servers. dell update package (dup) framework file versions prior to 3.8.3.67 used in dell client platforms. the vulnerability is limited to the dup framework during the time window when a dup is being executed by an administrator. during this time window, a locally authenticated low privilege malicious user potentially could exploit this vulnerability by tricking an administrator into running a trusted binary, causing it to load a malicious dll and allowing the attacker to execute arbitrary code on the victim system. the vulnerability does not affect the actual binary payload that the dup delivers. Access Authentication: NONE Access Complexity: HIGH Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-09-24 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Uncontrolled Search Path Element.", "role": "user" }, { "content": "CWE Code: 427\nVulnerability Type: privilege_escalation\nCVSS Score: 6.2\nCWE Name: Uncontrolled Search Path Element\nSummary: an uncontrolled search path vulnerability is applicable to the following: dell update package (dup) framework file versions prior to 19.1.0.413, and framework file versions prior to 103.4.6.69 used in dell emc servers. dell update package (dup) framework file versions prior to 3.8.3.67 used in dell client platforms. the vulnerability is limited to the dup framework during the time window when a dup is being executed by an administrator. during this time window, a locally authenticated low privilege malicious user potentially could exploit this vulnerability by tricking an administrator into running a trusted binary, causing it to load a malicious dll and allowing the attacker to execute arbitrary code on the victim system. the vulnerability does not affect the actual binary payload that the dup delivers.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-09-24\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Improper Input Validation Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2019-04-23 Last Modified Date: 2019-08-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Input Validation\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-04-23\nLast Modified Date: 2019-08-14", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Improper Access Control Summary: an elevation of privilege vulnerability in the aosp launcher in android 7.0 before 2016-11-01 could allow a local malicious application to create shortcuts that have elevated privileges without the user's consent. this issue is rated as moderate because it is a local bypass of user interaction requirements (access to functionality that would normally require either user initiation or user permission). android id: a-30778130. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2016-11-25 Last Modified Date: 2016-12-06
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Improper Access Control\nSummary: an elevation of privilege vulnerability in the aosp launcher in android 7.0 before 2016-11-01 could allow a local malicious application to create shortcuts that have elevated privileges without the user's consent. this issue is rated as moderate because it is a local bypass of user interaction requirements (access to functionality that would normally require either user initiation or user permission). android id: a-30778130.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2016-11-25\nLast Modified Date: 2016-12-06", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Improper Privilege Management Summary: vulnerability in the oracle flexcube private banking component of oracle financial services applications (subcomponent: miscellaneous). supported versions that are affected are 2.0.0, 2.0.1, 2.2.0 and 12.0.1. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle flexcube private banking. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle flexcube private banking accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2017-08-08 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Privilege Management\nSummary: vulnerability in the oracle flexcube private banking component of oracle financial services applications (subcomponent: miscellaneous). supported versions that are affected are 2.0.0, 2.0.1, 2.2.0 and 12.0.1. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle flexcube private banking. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle flexcube private banking accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-08-08\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in the arcade module in bcoos 1.0.10 allows remote attackers to execute arbitrary sql commands via the gid parameter in a play_game action. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-09-26 Last Modified Date: 2017-07-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the arcade module in bcoos 1.0.10 allows remote attackers to execute arbitrary sql commands via the gid parameter in a play_game action. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-09-26\nLast Modified Date: 2017-07-29", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 4.9 CWE Name: Improper Access Control Summary: vulnerability in the peoplesoft enterprise pt peopletools component of oracle peoplesoft products (subcomponent: application server). supported versions that are affected are 8.55, 8.56 and 8.57. difficult to exploit vulnerability allows low privileged attacker with network access via http to compromise peoplesoft enterprise pt peopletools. while the vulnerability is in peoplesoft enterprise pt peopletools, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all peoplesoft enterprise pt peopletools accessible data as well as unauthorized read access to a subset of peoplesoft enterprise pt peopletools accessible data. cvss 3.0 base score 7.1 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:n/ac:h/pr:l/ui:n/s:c/c:l/i:h/a:n). Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/NONE Published Date: 2019-07-23 Last Modified Date: 2019-07-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Improper Access Control\nSummary: vulnerability in the peoplesoft enterprise pt peopletools component of oracle peoplesoft products (subcomponent: application server). supported versions that are affected are 8.55, 8.56 and 8.57. difficult to exploit vulnerability allows low privileged attacker with network access via http to compromise peoplesoft enterprise pt peopletools. while the vulnerability is in peoplesoft enterprise pt peopletools, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all peoplesoft enterprise pt peopletools accessible data as well as unauthorized read access to a subset of peoplesoft enterprise pt peopletools accessible data. cvss 3.0 base score 7.1 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:n/ac:h/pr:l/ui:n/s:c/c:l/i:h/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2019-07-23\nLast Modified Date: 2019-07-25", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in admin/index.php in submitter script 2 allow remote attackers to execute arbitrary sql commands via (1) the unev parameter (aka the username field) or (2) the ujelszo parameter (aka the password field). Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-05-29 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in admin/index.php in submitter script 2 allow remote attackers to execute arbitrary sql commands via (1) the unev parameter (aka the username field) or (2) the ujelszo parameter (aka the password field).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-05-29\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in phpgwapi /inc/class.auth_sql.inc.php in phpgroupware 0.9.16.12, and possibly other versions before 0.9.16.014, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the passwd parameter to login.php. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-12-24 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in phpgwapi /inc/class.auth_sql.inc.php in phpgroupware 0.9.16.12, and possibly other versions before 0.9.16.014, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the passwd parameter to login.php.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-24\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 5.5 CWE Name: Improper Input Validation Summary: drivers/vhost/net.c in the linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest os users to cause a denial of service (memory corruption and host os crash) or possibly gain privileges on the host os via crafted packets, related to the handle_rx and get_rx_bufs functions. Access Authentication: SINGLE Access Complexity: HIGH Access Vector: ADJACENT_NETWORK Impact (C/I/A): PARTIAL/PARTIAL/COMPLETE Published Date: 2014-04-14 Last Modified Date: 2017-01-07
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Input Validation\nSummary: drivers/vhost/net.c in the linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest os users to cause a denial of service (memory corruption and host os crash) or possibly gain privileges on the host os via crafted packets, related to the handle_rx and get_rx_bufs functions.\nAccess Authentication: SINGLE\nAccess Complexity: HIGH\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/COMPLETE\nPublished Date: 2014-04-14\nLast Modified Date: 2017-01-07", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in detail.php in feedback and rating script 1.0 allows remote attackers to execute arbitrary sql commands via the listingid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-05-16 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in detail.php in feedback and rating script 1.0 allows remote attackers to execute arbitrary sql commands via the listingid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-16\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the joomla! bulletin board (aka joo!bb or com_joobb) component 0.5.9 for joomla! allows remote attackers to execute arbitrary sql commands via the forum parameter in a forum action to index.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-06-10 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the joomla! bulletin board (aka joo!bb or com_joobb) component 0.5.9 for joomla! allows remote attackers to execute arbitrary sql commands via the forum parameter in a forum action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-10\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in ajaxfs.php in the ajax forum stat (ajaxfs) plugin 2.0 for mybb (aka mybulletinboard) allow remote attackers to execute arbitrary sql commands via the (1) tooltip or (2) usertooltip parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2013-12-04 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in ajaxfs.php in the ajax forum stat (ajaxfs) plugin 2.0 for mybb (aka mybulletinboard) allow remote attackers to execute arbitrary sql commands via the (1) tooltip or (2) usertooltip parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-12-04\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: hp support assistant 8.7.50 and earlier allows a user to gain system privilege and allows unauthorized modification of directories or files. note: a different vulnerability than cve-2019-6328. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-06-25 Last Modified Date: 2019-10-23
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: hp support assistant 8.7.50 and earlier allows a user to gain system privilege and allows unauthorized modification of directories or files. note: a different vulnerability than cve-2019-6328.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-25\nLast Modified Date: 2019-10-23", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 6.2 CWE Name: Improper Input Validation Summary: a certain red hat build of the pam_ssh_agent_auth module on red hat enterprise linux (rhel) 6 and fedora rawhide calls the glibc error function instead of the error function in the openssh codebase, which allows local users to obtain sensitive information from process memory or possibly gain privileges via crafted use of an application that relies on this module, as demonstrated by su and sudo. Access Authentication: NONE Access Complexity: HIGH Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2013-02-22 Last Modified Date: 2019-04-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.2\nCWE Name: Improper Input Validation\nSummary: a certain red hat build of the pam_ssh_agent_auth module on red hat enterprise linux (rhel) 6 and fedora rawhide calls the glibc error function instead of the error function in the openssh codebase, which allows local users to obtain sensitive information from process memory or possibly gain privileges via crafted use of an application that relies on this module, as demonstrated by su and sudo.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-02-22\nLast Modified Date: 2019-04-22", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Improper Input Validation Summary: cisco ios xe 3.5e and earlier on ws-c3850, ws-c3860, and air-ct5760 devices does not properly parse the "request system shell" challenge response, which allows local users to obtain linux root access by leveraging administrative privilege, aka bug id cscur09815. Access Authentication: SINGLE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2014-11-07 Last Modified Date: 2017-09-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Input Validation\nSummary: cisco ios xe 3.5e and earlier on ws-c3850, ws-c3860, and air-ct5760 devices does not properly parse the \"request system shell\" challenge response, which allows local users to obtain linux root access by leveraging administrative privilege, aka bug id cscur09815.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-11-07\nLast Modified Date: 2017-09-08", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: an remote code execution vulnerability exists when azure app service/ antares on azure stack fails to check the length of a buffer prior to copying memory to it.an attacker who successfully exploited this vulnerability could allow an unprivileged function run by the user to execute code in the context of nt authority\system thereby escaping the sandbox.the security update addresses the vulnerability by ensuring that azure app service sanitizes user inputs., aka 'azure app service remote code execution vulnerability'. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-10-10 Last Modified Date: 2019-10-16
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an remote code execution vulnerability exists when azure app service/ antares on azure stack fails to check the length of a buffer prior to copying memory to it.an attacker who successfully exploited this vulnerability could allow an unprivileged function run by the user to execute code in the context of nt authority\\system thereby escaping the sandbox.the security update addresses the vulnerability by ensuring that azure app service sanitizes user inputs., aka 'azure app service remote code execution vulnerability'.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-10-10\nLast Modified Date: 2019-10-16", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.6 CWE Name: Permissions Privileges and Access Controls Summary: an elevation of privilege vulnerability in the broadcom wi-fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. product: android. versions: kernel-3.10, kernel-3.18. android id: a-29000183. references: b-rb#106314. Access Authentication: NONE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-01-12 Last Modified Date: 2017-01-18
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability in the broadcom wi-fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. product: android. versions: kernel-3.10, kernel-3.18. android id: a-29000183. references: b-rb#106314.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-01-18", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in data.php in phpcms 2008 v2 allows remote attackers to execute arbitrary sql commands via the where_time parameter in a get action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-01-25 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in data.php in phpcms 2008 v2 allows remote attackers to execute arbitrary sql commands via the where_time parameter in a get action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-01-25\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in jamm cms allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-06-18 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in jamm cms allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-18\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Information Exposure Summary: the auto local logon feature in check point vpn-1 securemote/secureclient ngx r60 and r56 for windows caches credentials under the checkpoint\securemote registry key, which has everyone/full control permissions, which allows local users to gain privileges by reading and reusing the credentials. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2008-02-08 Last Modified Date: 2018-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Information Exposure\nSummary: the auto local logon feature in check point vpn-1 securemote/secureclient ngx r60 and r56 for windows caches credentials under the checkpoint\\securemote registry key, which has everyone/full control permissions, which allows local users to gain privileges by reading and reusing the credentials.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2008-02-08\nLast Modified Date: 2018-10-15", "role": "assistant" } ]
CWE Code: 426 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Untrusted Search Path Summary: untrusted search path vulnerability in encrypted files in self-decryption format created by filecapsule deluxe portable ver.1.0.4.1 and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-07-17 Last Modified Date: 2017-07-20
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Untrusted Search Path.", "role": "user" }, { "content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in encrypted files in self-decryption format created by filecapsule deluxe portable ver.1.0.4.1 and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-07-17\nLast Modified Date: 2017-07-20", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 5.8 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: memory corruption issues in intel(r) wifi drivers before version 21.40 may allow a privileged user to potentially enable escalation of privilege, denial of service, and information disclosure via adjacent access. Access Authentication: NONE Access Complexity: UNKNOWN Access Vector: UNKNOWN Impact (C/I/A): NONE/NONE/NONE Published Date: 2019-11-14 Last Modified Date: 2019-11-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 5.8\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: memory corruption issues in intel(r) wifi drivers before version 21.40 may allow a privileged user to potentially enable escalation of privilege, denial of service, and information disclosure via adjacent access.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-14\nLast Modified Date: 2019-11-14", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in the com_profile component for joomla! allows remote attackers to execute arbitrary sql commands via the oid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-02-20 Last Modified Date: 2008-09-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the com_profile component for joomla! allows remote attackers to execute arbitrary sql commands via the oid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-20\nLast Modified Date: 2008-09-05", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Improper Input Validation Summary: insufficient write protection in firmware for intel(r) optane(tm) ssd dc p4800x before version e2010435 may allow a privileged user to potentially enable a denial of service via local access. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2019-01-10 Last Modified Date: 2019-02-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Input Validation\nSummary: insufficient write protection in firmware for intel(r) optane(tm) ssd dc p4800x before version e2010435 may allow a privileged user to potentially enable a denial of service via local access.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-01-10\nLast Modified Date: 2019-02-01", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: multiple buffer overflows in drivers/char/diag/diag_debugfs.c in the qualcomm components in android before 2016-07-05 on nexus 5 and 7 (2013) devices allow attackers to gain privileges via a crafted application, aka android internal bug 28442449 and qualcomm internal bug cr585147. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-07-11 Last Modified Date: 2016-11-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: multiple buffer overflows in drivers/char/diag/diag_debugfs.c in the qualcomm components in android before 2016-07-05 on nexus 5 and 7 (2013) devices allow attackers to gain privileges via a crafted application, aka android internal bug 28442449 and qualcomm internal bug cr585147.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-11\nLast Modified Date: 2016-11-28", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in viewlinks.php in sava's link manager 2.0 allows remote attackers to execute arbitrary sql commands via the category parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-04-02 Last Modified Date: 2017-08-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in viewlinks.php in sava's link manager 2.0 allows remote attackers to execute arbitrary sql commands via the category parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-04-02\nLast Modified Date: 2017-08-08", "role": "assistant" } ]
CWE Code: 310 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Cryptographic Issues Summary: the get_instantiation_keyring function in security/keys/keyctl.c in the keys subsystem in the linux kernel before 2.6.32-rc5 does not properly maintain the reference count of a keyring, which allows local users to gain privileges or cause a denial of service (oops) via vectors involving calls to this function without specifying a keyring by id, as demonstrated by a series of keyctl request2 and keyctl list commands. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-11-02 Last Modified Date: 2012-03-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Cryptographic Issues.", "role": "user" }, { "content": "CWE Code: 310\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Cryptographic Issues\nSummary: the get_instantiation_keyring function in security/keys/keyctl.c in the keys subsystem in the linux kernel before 2.6.32-rc5 does not properly maintain the reference count of a keyring, which allows local users to gain privileges or cause a denial of service (oops) via vectors involving calls to this function without specifying a keyring by id, as demonstrated by a series of keyctl request2 and keyctl list commands.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-11-02\nLast Modified Date: 2012-03-19", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the simple shop galore (com_simpleshop) component for joomla! allows remote attackers to execute arbitrary sql commands via the section parameter in a section action to index.php, a different vulnerability than cve-2008-2568. note: this issue was disclosed by an unreliable researcher, so the details might be incorrect. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-08-24 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the simple shop galore (com_simpleshop) component for joomla! allows remote attackers to execute arbitrary sql commands via the section parameter in a section action to index.php, a different vulnerability than cve-2008-2568. note: this issue was disclosed by an unreliable researcher, so the details might be incorrect.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-08-24\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in report.php in meeting room booking system (mrbs) before 1.4.2 allows remote attackers to execute arbitrary sql commands via the typematch parameter. note: some of these details are obtained from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-10-02 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in report.php in meeting room booking system (mrbs) before 1.4.2 allows remote attackers to execute arbitrary sql commands via the typematch parameter. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-10-02\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: an issue was discovered in certain apple products. macos before 10.12.5 is affected. the issue involves the "kernel" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-05-22 Last Modified Date: 2017-07-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. macos before 10.12.5 is affected. the issue involves the \"kernel\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-05-22\nLast Modified Date: 2017-07-08", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in login.asp in dvbbs 8.2.0 allows remote attackers to execute arbitrary sql commands via the username parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-11-25 Last Modified Date: 2018-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in login.asp in dvbbs 8.2.0 allows remote attackers to execute arbitrary sql commands via the username parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-11-25\nLast Modified Date: 2018-10-11", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in search.php in wsn links 5.0.x before 5.0.81, 5.1.x before 5.1.51, and 6.0.x before 6.0.1 allow remote attackers to execute arbitrary sql commands via the (1) namecondition or (2) namesearch parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-11-03 Last Modified Date: 2018-10-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in search.php in wsn links 5.0.x before 5.0.81, 5.1.x before 5.1.51, and 6.0.x before 6.0.1 allow remote attackers to execute arbitrary sql commands via the (1) namecondition or (2) namesearch parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-11-03\nLast Modified Date: 2018-10-10", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Improper Privilege Management Summary: an error was found in the permission model used by x-pack alerting 5.0.0 to 5.6.0 whereby users mapped to certain built-in roles could create a watch that results in that user gaining elevated privileges. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-09-29 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Privilege Management\nSummary: an error was found in the permission model used by x-pack alerting 5.0.0 to 5.6.0 whereby users mapped to certain built-in roles could create a watch that results in that user gaining elevated privileges.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-09-29\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in post.php in xzero community classifieds 4.95.11 and earlier allows remote attackers to execute arbitrary sql commands via the subcatid parameter to index.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-12-28 Last Modified Date: 2018-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in post.php in xzero community classifieds 4.95.11 and earlier allows remote attackers to execute arbitrary sql commands via the subcatid parameter to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-12-28\nLast Modified Date: 2018-10-15", "role": "assistant" } ]
CWE Code: 190 Vulnerability Type: privilege_escalation CVSS Score: 3.3 CWE Name: Integer Overflow or Wraparound Summary: in llcp_link_proc_agf_pdu of llcp_link.cc in android-7.0, android-7.1.1, android-7.1.2, android-8.0, android-8.1 and android-9, there is a possible out of bounds read due to an integer overflow. this could lead to local information disclosure over nfc with no additional execution privileges needed. user interaction is not needed for exploitation. android id: a-116791157. Access Authentication: NONE Access Complexity: LOW Access Vector: ADJACENT_NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-02-11 Last Modified Date: 2019-02-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.", "role": "user" }, { "content": "CWE Code: 190\nVulnerability Type: privilege_escalation\nCVSS Score: 3.3\nCWE Name: Integer Overflow or Wraparound\nSummary: in llcp_link_proc_agf_pdu of llcp_link.cc in android-7.0, android-7.1.1, android-7.1.2, android-8.0, android-8.1 and android-9, there is a possible out of bounds read due to an integer overflow. this could lead to local information disclosure over nfc with no additional execution privileges needed. user interaction is not needed for exploitation. android id: a-116791157.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-02-11\nLast Modified Date: 2019-02-12", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: multiple client-side cross site scripting vulnerabilities have been discovered in the wpjobboard v4.5.1 web-application for wordpress. the vulnerabilities are located in the `query` and `id` parameters of the `wpjb-email`, `wpjb-job`, `wpjb-application`, and `wpjb-membership` modules. remote attackers are able to inject malicious script code to hijack admin session credentials via the backend, or to manipulate the backend on client-side performed requests. the attack vector is non-persistent and the request method to inject is get. the attacker does not need a privileged user account to perform a successful exploitation. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2017-10-16 Last Modified Date: 2017-11-06
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: multiple client-side cross site scripting vulnerabilities have been discovered in the wpjobboard v4.5.1 web-application for wordpress. the vulnerabilities are located in the `query` and `id` parameters of the `wpjb-email`, `wpjb-job`, `wpjb-application`, and `wpjb-membership` modules. remote attackers are able to inject malicious script code to hijack admin session credentials via the backend, or to manipulate the backend on client-side performed requests. the attack vector is non-persistent and the request method to inject is get. the attacker does not need a privileged user account to perform a successful exploitation.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2017-10-16\nLast Modified Date: 2017-11-06", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Improper Access Control Summary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in takeover of oracle vm virtualbox. cvss 3.0 base score 8.8 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:h/i:h/a:h). Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-01-16 Last Modified Date: 2019-06-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in takeover of oracle vm virtualbox. cvss 3.0 base score 8.8 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:h/i:h/a:h).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-01-16\nLast Modified Date: 2019-06-11", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Information Exposure Summary: vulnerability in the oracle business intelligence enterprise edition component of oracle fusion middleware (subcomponent: bi platform security). supported versions that are affected are 12.2.1.2.0 and 12.2.1.3.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle business intelligence enterprise edition. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle business intelligence enterprise edition accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2018-01-18 Last Modified Date: 2018-01-24
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: vulnerability in the oracle business intelligence enterprise edition component of oracle fusion middleware (subcomponent: bi platform security). supported versions that are affected are 12.2.1.2.0 and 12.2.1.3.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle business intelligence enterprise edition. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle business intelligence enterprise edition accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-01-18\nLast Modified Date: 2018-01-24", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in mkportal 1.1.1 allows remote attackers to execute arbitrary sql commands via unspecified vectors, aka zd-00000008. this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. a cve has been assigned for tracking purposes, but duplicates with other cves are difficult to determine. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-07-10 Last Modified Date: 2008-11-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in mkportal 1.1.1 allows remote attackers to execute arbitrary sql commands via unspecified vectors, aka zd-00000008. this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. a cve has been assigned for tracking purposes, but duplicates with other cves are difficult to determine.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-07-10\nLast Modified Date: 2008-11-15", "role": "assistant" } ]