text
stringlengths 365
3.97k
| conversations
listlengths 3
3
|
---|---|
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: zoho manageengine applications manager 13 before build 13500 allows post-authentication sql injection via the name parameter in a manageapplications.do?method=insert request.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-11-05
Last Modified Date: 2018-08-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: zoho manageengine applications manager 13 before build 13500 allows post-authentication sql injection via the name parameter in a manageapplications.do?method=insert request.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-11-05\nLast Modified Date: 2018-08-07",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the gocodes plugin through 1.3.5 for wordpress has wp-admin/tools.php gcid sql injection.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-09-20
Last Modified Date: 2019-09-20 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the gocodes plugin through 1.3.5 for wordpress has wp-admin/tools.php gcid sql injection.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-20\nLast Modified Date: 2019-09-20",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: an issue was discovered in idreamsoft icms v7.0.14. there is a spider_project.admincp.php sql injection vulnerability in the 'upload spider project scheme' feature via a two-dimensional payload.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-10-14
Last Modified Date: 2019-10-16 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in idreamsoft icms v7.0.14. there is a spider_project.admincp.php sql injection vulnerability in the 'upload spider project scheme' feature via a two-dimensional payload.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-10-14\nLast Modified Date: 2019-10-16",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: an issue was discovered in emlsoft 5.4.5. upload\eml\action\action.user.php has sql injection via the numperpage parameter.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-08-06
Last Modified Date: 2018-10-04 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in emlsoft 5.4.5. upload\\eml\\action\\action.user.php has sql injection via the numperpage parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-08-06\nLast Modified Date: 2018-10-04",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in roomphplanning 1.5 allows remote attackers to execute arbitrary sql commands via the idroom parameter to weekview.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-04-07
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in roomphplanning 1.5 allows remote attackers to execute arbitrary sql commands via the idroom parameter to weekview.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-04-07\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in index.php in joomla! 1.5 rc3 allow remote attackers to execute arbitrary sql commands via (1) the view parameter to the com_content component, (2) the task parameter to the com_search component, or (3) the option parameter in a search action to the com_search component.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-12-07
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in joomla! 1.5 rc3 allow remote attackers to execute arbitrary sql commands via (1) the view parameter to the com_content component, (2) the task parameter to the com_search component, or (3) the option parameter in a search action to the com_search component.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-12-07\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Permissions Privileges and Access Controls
Summary: microsoft .net framework 2.0 sp2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 processes unverified data during interaction with the clickonce installer, which allows remote attackers to gain privileges via vectors involving internet explorer, aka ".net clickonce elevation of privilege vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-10-15
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: microsoft .net framework 2.0 sp2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 processes unverified data during interaction with the clickonce installer, which allows remote attackers to gain privileges via vectors involving internet explorer, aka \".net clickonce elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-10-15\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in directory.php in prozilla adult directory allows remote attackers to execute arbitrary sql commands via the cat_id parameter in a list action. note: the original report indicated that this was the "photo" sourceforge project (aka maan bsat photo collection), but that was incorrect.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-07-30
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in directory.php in prozilla adult directory allows remote attackers to execute arbitrary sql commands via the cat_id parameter in a list action. note: the original report indicated that this was the \"photo\" sourceforge project (aka maan bsat photo collection), but that was incorrect.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-07-30\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index2.php in uiga fan club allows remote attackers to execute arbitrary sql commands via the p parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-07-25
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index2.php in uiga fan club allows remote attackers to execute arbitrary sql commands via the p parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-07-25\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 94
Vulnerability Type: privilege_escalation
CVSS Score: 8.5
CWE Name: Improper Control of Generation of Code ('Code Injection')
Summary: ** disputed ** scripts/wwwacct in cpanel 11.18.6 stable and earlier and 11.23.1 current and earlier allows remote authenticated users with reseller privileges to execute arbitrary code via shell metacharacters in the email address field (aka email text box). note: the vendor disputes this, stating "i'm unable to reproduce such an issue on multiple servers running different versions of cpanel."
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2008-05-28
Last Modified Date: 2018-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Control of Generation of Code ('Code Injection').",
"role": "user"
},
{
"content": "CWE Code: 94\nVulnerability Type: privilege_escalation\nCVSS Score: 8.5\nCWE Name: Improper Control of Generation of Code ('Code Injection')\nSummary: ** disputed ** scripts/wwwacct in cpanel 11.18.6 stable and earlier and 11.23.1 current and earlier allows remote authenticated users with reseller privileges to execute arbitrary code via shell metacharacters in the email address field (aka email text box). note: the vendor disputes this, stating \"i'm unable to reproduce such an issue on multiple servers running different versions of cpanel.\"\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2008-05-28\nLast Modified Date: 2018-10-11",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 8.5
CWE Name: Improper Access Control
Summary: emc isilon onefs 7.1.x before 7.1.1.5, 7.2.0.x before 7.2.0.3, and 7.2.1.x before 7.2.1.1, when the rfc 2307 feature is configured but sfu is not universally present, allows remote authenticated ad users to obtain root privileges via unspecified vectors.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-11-27
Last Modified Date: 2015-11-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 8.5\nCWE Name: Improper Access Control\nSummary: emc isilon onefs 7.1.x before 7.1.1.5, 7.2.0.x before 7.2.0.3, and 7.2.1.x before 7.2.1.1, when the rfc 2307 feature is configured but sfu is not universally present, allows remote authenticated ad users to obtain root privileges via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-11-27\nLast Modified Date: 2015-11-27",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Out-of-bounds Write
Summary: in ashmem_ioctl of ashmem.c, there is an out-of-bounds write due to insufficient locking when accessing asma. this could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android kernel. android id: a-66954097.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-01-12
Last Modified Date: 2018-01-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Out-of-bounds Write\nSummary: in ashmem_ioctl of ashmem.c, there is an out-of-bounds write due to insufficient locking when accessing asma. this could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android kernel. android id: a-66954097.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-01-12\nLast Modified Date: 2018-01-30",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the do_setup_env function in session.c in sshd in openssh through 7.2p2, when the uselogin feature is enabled and pam is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an ld_preload environment variable.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-05-01
Last Modified Date: 2018-06-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the do_setup_env function in session.c in sshd in openssh through 7.2p2, when the uselogin feature is enabled and pam is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an ld_preload environment variable.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-05-01\nLast Modified Date: 2018-06-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in spamtitan webtitan before 3.60 allow remote attackers to execute arbitrary sql commands via (1) the username parameter to login-x.php, and allow remote authenticated users to execute arbitrary sql commands via the (2) bldomain, (3) wldomain, or (4) temid parameter to urls-x.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-10-08
Last Modified Date: 2012-10-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in spamtitan webtitan before 3.60 allow remote attackers to execute arbitrary sql commands via (1) the username parameter to login-x.php, and allow remote authenticated users to execute arbitrary sql commands via the (2) bldomain, (3) wldomain, or (4) temid parameter to urls-x.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-10-08\nLast Modified Date: 2012-10-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in bm classifieds 20080309 and earlier allow remote attackers to execute arbitrary sql commands via the (1) cat parameter to showad.php and the (2) ad parameter to pfriendly.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-03-10
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in bm classifieds 20080309 and earlier allow remote attackers to execute arbitrary sql commands via the (1) cat parameter to showad.php and the (2) ad parameter to pfriendly.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-03-10\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 399
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Resource Management Errors
Summary: untrusted search path vulnerability in the installer in mozilla firefox before 15.0, firefox esr 10.x before 10.0.7, thunderbird before 15.0, and thunderbird esr 10.x before 10.0.7 on windows allows local users to gain privileges via a trojan horse executable file in a root directory.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2012-08-29
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Resource Management Errors.",
"role": "user"
},
{
"content": "CWE Code: 399\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Resource Management Errors\nSummary: untrusted search path vulnerability in the installer in mozilla firefox before 15.0, firefox esr 10.x before 10.0.7, thunderbird before 15.0, and thunderbird esr 10.x before 10.0.7 on windows allows local users to gain privileges via a trojan horse executable file in a root directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-08-29\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in serendipity/serendipity_admin.php in serendipity before 1.6.1 allows remote attackers to execute arbitrary sql commands via the serendipity[plugin_to_conf] parameter. note: this issue might be resultant from cross-site request forgery (csrf).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-08-13
Last Modified Date: 2012-08-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in serendipity/serendipity_admin.php in serendipity before 1.6.1 allows remote attackers to execute arbitrary sql commands via the serendipity[plugin_to_conf] parameter. note: this issue might be resultant from cross-site request forgery (csrf).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-08-13\nLast Modified Date: 2012-08-14",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.8
CWE Name: Improper Input Validation
Summary: in the hardware hevc decoder, some media files could cause a page fault. this could lead to a remote denial of service of a critical system process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android kernel. android id: a-38495900.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2018-01-12
Last Modified Date: 2018-02-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.8\nCWE Name: Improper Input Validation\nSummary: in the hardware hevc decoder, some media files could cause a page fault. this could lead to a remote denial of service of a critical system process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android kernel. android id: a-38495900.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2018-01-12\nLast Modified Date: 2018-02-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in smartcms v.2.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-08-28
Last Modified Date: 2017-08-31 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in smartcms v.2.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-08-28\nLast Modified Date: 2017-08-31",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "win32k elevation of privilege vulnerability." a different vulnerability than cve-2016-3266, cve-2016-3376, and cve-2016-7211.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-10-14
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\" a different vulnerability than cve-2016-3266, cve-2016-3376, and cve-2016-7211.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-10-14\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in live tv script allows remote attackers to execute arbitrary sql commands via the mid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-01
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in live tv script allows remote attackers to execute arbitrary sql commands via the mid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-01\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 5.5
CWE Name: Improper Access Control
Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: replication). supported versions that are affected are 8.0.16 and prior. easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server as well as unauthorized update, insert or delete access to some of mysql server accessible data. cvss 3.0 base score 7.1 (integrity and availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:n/i:l/a:h).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/PARTIAL
Published Date: 2019-07-23
Last Modified Date: 2019-08-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Access Control\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: replication). supported versions that are affected are 8.0.16 and prior. easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server as well as unauthorized update, insert or delete access to some of mysql server accessible data. cvss 3.0 base score 7.1 (integrity and availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:n/i:l/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/PARTIAL\nPublished Date: 2019-07-23\nLast Modified Date: 2019-08-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in stats/index.php in chcounter 3.1.3 allow remote attackers to execute arbitrary sql commands via (1) the login_name parameter (aka the username field) or (2) the login_pw parameter (aka the password field).
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-04-20
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in stats/index.php in chcounter 3.1.3 allow remote attackers to execute arbitrary sql commands via (1) the login_name parameter (aka the username field) or (2) the login_pw parameter (aka the password field).\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-04-20\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 732
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Incorrect Permission Assignment for Critical Resource
Summary: an exploitable local privilege escalation vulnerability exists in the privileged helper tool of gog galaxy's games, version 1.2.47 for macos. an attacker can globally adjust folder permissions leading to execution of arbitrary code with elevated privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-04-01
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.",
"role": "user"
},
{
"content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: an exploitable local privilege escalation vulnerability exists in the privileged helper tool of gog galaxy's games, version 1.2.47 for macos. an attacker can globally adjust folder permissions leading to execution of arbitrary code with elevated privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-04-01\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 732
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Incorrect Permission Assignment for Critical Resource
Summary: an issue was discovered in the self service portal in zoho manageengine desktop central before 10.0.282. a clickable company logo in a window running as system can be abused to escalate privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-09-12
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.",
"role": "user"
},
{
"content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: an issue was discovered in the self service portal in zoho manageengine desktop central before 10.0.282. a clickable company logo in a window running as system can be abused to escalate privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-09-12\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in ewebquiz.asp in activewebsoftwares.com ewebquiz 8 allows remote attackers to execute arbitrary sql commands via the quiztype parameter, a different vector than cve-2007-1706.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-06-21
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in ewebquiz.asp in activewebsoftwares.com ewebquiz 8 allows remote attackers to execute arbitrary sql commands via the quiztype parameter, a different vector than cve-2007-1706.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-06-21\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in frontpage.php in goople cms 1.8.2 allows remote attackers to execute arbitrary sql commands via the password parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-01-15
Last Modified Date: 2009-01-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in frontpage.php in goople cms 1.8.2 allows remote attackers to execute arbitrary sql commands via the password parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-01-15\nLast Modified Date: 2009-01-15",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.0
CWE Name: Permissions Privileges and Access Controls
Summary: openstack identity (keystone) before 2013.2.4, 2014.1 before 2014.1.2, and juno before juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) oauth token with impersonation enabled to create a new token with additional roles.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-06-17
Last Modified Date: 2017-12-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: openstack identity (keystone) before 2013.2.4, 2014.1 before 2014.1.2, and juno before juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) oauth token with impersonation enabled to create a new token with additional roles.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-06-17\nLast Modified Date: 2017-12-22",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in pligg 9.9 and earlier allow remote attackers to execute arbitrary sql commands via the (1) id parameter to vote.php, which is not properly handled in libs/link.php; (2) id parameter to trackback.php; (3) an unspecified parameter to submit.php; (4) requesttitle variable in a query to story.php; (5) requestid and (6) requesttitle variables in recommend.php; (7) categoryid parameter to cloud.php; (8) title parameter to out.php; (9) username parameter to login.php; (10) id parameter to cvote.php; and (11) commentid parameter to edit.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-08-26
Last Modified Date: 2018-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in pligg 9.9 and earlier allow remote attackers to execute arbitrary sql commands via the (1) id parameter to vote.php, which is not properly handled in libs/link.php; (2) id parameter to trackback.php; (3) an unspecified parameter to submit.php; (4) requesttitle variable in a query to story.php; (5) requestid and (6) requesttitle variables in recommend.php; (7) categoryid parameter to cloud.php; (8) title parameter to out.php; (9) username parameter to login.php; (10) id parameter to cvote.php; and (11) commentid parameter to edit.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-08-26\nLast Modified Date: 2018-10-11",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 5.0
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: a sql injection vulnerability in intramaps mapcontrol 8 allows attackers to execute arbitrary sql commands via the /applicationengine/search/refine/set page.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-05
Last Modified Date: 2019-09-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection vulnerability in intramaps mapcontrol 8 allows attackers to execute arbitrary sql commands via the /applicationengine/search/refine/set page.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-05\nLast Modified Date: 2019-09-05",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: stack-based buffer overflow in db2aud in the audit facility in ibm db2 and db2 connect 9.1, 9.5, 9.7, 9.8, and 10.1, as used in smart analytics system 7600 and other products, allows local users to gain privileges via unspecified vectors. per: http://www-01.ibm.com/support/docview.wss?uid=swg21639355
'the following ibm db2 and db2 connect v9.1, v9.5, v9.7 and v10.1 editions running on aix, linux, hp and solaris (this vulnerability is not applicable to db2 on windows.).'
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-06-05
Last Modified Date: 2018-09-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: stack-based buffer overflow in db2aud in the audit facility in ibm db2 and db2 connect 9.1, 9.5, 9.7, 9.8, and 10.1, as used in smart analytics system 7600 and other products, allows local users to gain privileges via unspecified vectors. per: http://www-01.ibm.com/support/docview.wss?uid=swg21639355\r\n\r\n'the following ibm db2 and db2 connect v9.1, v9.5, v9.7 and v10.1 editions running on aix, linux, hp and solaris (this vulnerability is not applicable to db2 on windows.).'\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-06-05\nLast Modified Date: 2018-09-25",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the nsrpush process in the client in emc networker before 7.6.5.3 and 8.x before 8.0.1.4 sets weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-05-03
Last Modified Date: 2013-05-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the nsrpush process in the client in emc networker before 7.6.5.3 and 8.x before 8.0.1.4 sets weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-05-03\nLast Modified Date: 2013-05-03",
"role": "assistant"
}
] |
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Untrusted Search Path
Summary: untrusted search path vulnerability in foxit reader before 5.0.2.0718 allows local users to gain privileges via a trojan horse dwmapi.dll, dwrite.dll, or msdrm.dll in the current working directory. per: http://cwe.mitre.org/data/definitions/426.html
'cwe-426: untrusted search path'
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2011-09-27
Last Modified Date: 2016-11-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in foxit reader before 5.0.2.0718 allows local users to gain privileges via a trojan horse dwmapi.dll, dwrite.dll, or msdrm.dll in the current working directory. per: http://cwe.mitre.org/data/definitions/426.html\r\n'cwe-426: untrusted search path'\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2011-09-27\nLast Modified Date: 2016-11-08",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Information Exposure
Summary: multiple information leaks exist in various ioctl handlers of the kaspersky internet security kldisk driver. specially crafted ioctl requests can cause the driver to return out-of-bounds kernel memory, potentially leaking sensitive information such as privileged tokens or kernel memory addresses that may be useful in bypassing kernel mitigations. an unprivileged user can run a program from user-mode to trigger this vulnerability.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2017-01-06
Last Modified Date: 2017-08-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Information Exposure\nSummary: multiple information leaks exist in various ioctl handlers of the kaspersky internet security kldisk driver. specially crafted ioctl requests can cause the driver to return out-of-bounds kernel memory, potentially leaking sensitive information such as privileged tokens or kernel memory addresses that may be useful in bypassing kernel mitigations. an unprivileged user can run a program from user-mode to trigger this vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-01-06\nLast Modified Date: 2017-08-13",
"role": "assistant"
}
] |
CWE Code: 863
Vulnerability Type: privilege_escalation
CVSS Score: 8.5
CWE Name: Incorrect Authorization
Summary: windows error reporting (wer) in windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability, aka "windows error reporting elevation of privilege vulnerability".
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-08-08
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Authorization.",
"role": "user"
},
{
"content": "CWE Code: 863\nVulnerability Type: privilege_escalation\nCVSS Score: 8.5\nCWE Name: Incorrect Authorization\nSummary: windows error reporting (wer) in windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, 1607, 1703, and windows server 2016 allows an elevation of privilege vulnerability, aka \"windows error reporting elevation of privilege vulnerability\".\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-08-08\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allow local users to gain privileges via a crafted application, aka "win32k elevation of privilege vulnerability," a different vulnerability than cve-2016-3249, cve-2016-3252, and cve-2016-3254.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-07-13
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3249, cve-2016-3252, and cve-2016-3254.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-13\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Privilege Management
Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-1393, cve-2019-1394, cve-2019-1395, cve-2019-1396, cve-2019-1434.
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-12
Last Modified Date: 2019-11-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Privilege Management\nSummary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-1393, cve-2019-1394, cve-2019-1395, cve-2019-1396, cve-2019-1434.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-12\nLast Modified Date: 2019-11-12",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the kernel in apple os x before 10.10.5 does not properly validate pathnames in the environment, which allows local users to gain privileges via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-08-16
Last Modified Date: 2017-09-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the kernel in apple os x before 10.10.5 does not properly validate pathnames in the environment, which allows local users to gain privileges via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-08-16\nLast Modified Date: 2017-09-21",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 3.6
CWE Name: Improper Access Control
Summary: vulnerability in the oracle hospitality reporting and analytics component of oracle food and beverage applications. the supported version that is affected is 9.1.0. easily exploitable vulnerability allows low privileged attacker having report privilege with logon to the infrastructure where oracle hospitality reporting and analytics executes to compromise oracle hospitality reporting and analytics. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle hospitality reporting and analytics accessible data as well as unauthorized update, insert or delete access to some of oracle hospitality reporting and analytics accessible data. cvss 3.0 base score 6.1 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:h/i:l/a:n).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/NONE
Published Date: 2019-01-16
Last Modified Date: 2019-01-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 3.6\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle hospitality reporting and analytics component of oracle food and beverage applications. the supported version that is affected is 9.1.0. easily exploitable vulnerability allows low privileged attacker having report privilege with logon to the infrastructure where oracle hospitality reporting and analytics executes to compromise oracle hospitality reporting and analytics. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle hospitality reporting and analytics accessible data as well as unauthorized update, insert or delete access to some of oracle hospitality reporting and analytics accessible data. cvss 3.0 base score 6.1 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:h/i:l/a:n).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2019-01-16\nLast Modified Date: 2019-01-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in page.html in xstate real estate 1.0 allows remote attackers to execute arbitrary sql commands via the pid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-12-30
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in page.html in xstate real estate 1.0 allows remote attackers to execute arbitrary sql commands via the pid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-30\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Improper Input Validation
Summary: drivers/misc/qseecom.c in the qualcomm components in android before 2016-08-05 on nexus 5 and 7 (2013) devices does not validate certain pointers, which allows attackers to gain privileges via a crafted application, aka android internal bug 28769920 and qualcomm internal bug cr580740.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-08-06
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Input Validation\nSummary: drivers/misc/qseecom.c in the qualcomm components in android before 2016-08-05 on nexus 5 and 7 (2013) devices does not validate certain pointers, which allows attackers to gain privileges via a crafted application, aka android internal bug 28769920 and qualcomm internal bug cr580740.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-08-06\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in misc.php in deluxebb 1.3 and earlier allows remote attackers to execute arbitrary sql commands via the qorder parameter, a different vector than cve-2005-2989 and cve-2006-2503.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-03-20
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in misc.php in deluxebb 1.3 and earlier allows remote attackers to execute arbitrary sql commands via the qorder parameter, a different vector than cve-2005-2989 and cve-2006-2503.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-20\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in admin/admin.php in grafik cms 1.1.2, and possibly earlier, allows remote attackers to execute arbitrary sql commands via the id parameter in an edit_page action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-07-02
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in admin/admin.php in grafik cms 1.1.2, and possibly earlier, allows remote attackers to execute arbitrary sql commands via the id parameter in an edit_page action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-07-02\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: buffer overflow in the intel graphics driver in apple os x before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than cve-2015-3695, cve-2015-3696, cve-2015-3697, cve-2015-3698, cve-2015-3700, cve-2015-3701, and cve-2015-3702.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-07-03
Last Modified Date: 2017-09-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in the intel graphics driver in apple os x before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than cve-2015-3695, cve-2015-3696, cve-2015-3697, cve-2015-3698, cve-2015-3700, cve-2015-3701, and cve-2015-3702.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-07-03\nLast Modified Date: 2017-09-22",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Access Control
Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: partition). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-04-23
Last Modified Date: 2019-08-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Access Control\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: partition). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-04-23\nLast Modified Date: 2019-08-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the ns download shop (aka com_ns_downloadshop) component 2.2.6 for joomla! allows sql injection via the id parameter in an invoice.create action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-10-29
Last Modified Date: 2017-11-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the ns download shop (aka com_ns_downloadshop) component 2.2.6 for joomla! allows sql injection via the id parameter in an invoice.create action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-10-29\nLast Modified Date: 2017-11-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in lib/user.php in mahara 1.0.4 allows remote attackers to execute arbitrary sql commands via a username.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-04-07
Last Modified Date: 2010-04-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in lib/user.php in mahara 1.0.4 allows remote attackers to execute arbitrary sql commands via a username.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-04-07\nLast Modified Date: 2010-04-08",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.0
CWE Name: Permissions Privileges and Access Controls
Summary: the pl/php add-on 1.4 and earlier for postgresql does not properly protect script execution by a different sql user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a security definer function, a related issue to cve-2010-3433.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-10-06
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: the pl/php add-on 1.4 and earlier for postgresql does not properly protect script execution by a different sql user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a security definer function, a related issue to cve-2010-3433.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-10-06\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: there is a time-based blind sql injection vulnerability in the access manager component before 9.18.040 and 10.x before 10.18.040 in elo eloenterprise 9 and 10 and eloprofessional 9 and 10 that makes it possible to read all database content. the vulnerability exists in the ticket http get parameter. for example, one can succeed in reading the password hash of the administrator user in the "userdata" table from the "eloam" database.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-07-11
Last Modified Date: 2018-09-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: there is a time-based blind sql injection vulnerability in the access manager component before 9.18.040 and 10.x before 10.18.040 in elo eloenterprise 9 and 10 and eloprofessional 9 and 10 that makes it possible to read all database content. the vulnerability exists in the ticket http get parameter. for example, one can succeed in reading the password hash of the administrator user in the \"userdata\" table from the \"eloam\" database.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-07-11\nLast Modified Date: 2018-09-11",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the parish of the holy spirit religious art gallery (hs_religiousartgallery) extension 0.1.2 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-12-22
Last Modified Date: 2009-12-23 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the parish of the holy spirit religious art gallery (hs_religiousartgallery) extension 0.1.2 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-22\nLast Modified Date: 2009-12-23",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Permissions Privileges and Access Controls
Summary: the iphonehandle package 0.9.x before 0.9.7 and 1.0.x before 1.0.3 in open ticket request system (otrs) does not properly restrict use of the iphonehandle interface, which allows remote authenticated users to gain privileges, and consequently read or modify otrs core objects, via unspecified vectors.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-07-19
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: the iphonehandle package 0.9.x before 0.9.7 and 1.0.x before 1.0.3 in open ticket request system (otrs) does not properly restrict use of the iphonehandle interface, which allows remote authenticated users to gain privileges, and consequently read or modify otrs core objects, via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-07-19\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 668
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Exposure of Resource to Wrong Sphere
Summary: an issue was discovered in xen through 4.9.x allowing x86 hvm guest os users to cause a denial of service (hypervisor crash) or possibly gain privileges because self-linear shadow mappings are mishandled for translated guests.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-10-18
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Exposure of Resource to Wrong Sphere.",
"role": "user"
},
{
"content": "CWE Code: 668\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Exposure of Resource to Wrong Sphere\nSummary: an issue was discovered in xen through 4.9.x allowing x86 hvm guest os users to cause a denial of service (hypervisor crash) or possibly gain privileges because self-linear shadow mappings are mishandled for translated guests.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-10-18\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: a sql injection vulnerability exists in magento 2.2 prior to 2.2.10, magento 2.3 prior to 2.3.3 or 2.3.2-p1. a user with marketing privileges can execute arbitrary sql queries in the database when accessing email template variables.
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-06
Last Modified Date: 2019-11-06 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection vulnerability exists in magento 2.2 prior to 2.2.10, magento 2.3 prior to 2.3.3 or 2.3.2-p1. a user with marketing privileges can execute arbitrary sql queries in the database when accessing email template variables.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-06\nLast Modified Date: 2019-11-06",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: an issue was discovered in moxa softcms versions prior to version 1.6. the softcms application does not properly sanitize input that may allow a remote attacker access to softcms with administrator's privilege through specially crafted input (sql injection).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-02-13
Last Modified Date: 2017-06-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in moxa softcms versions prior to version 1.6. the softcms application does not properly sanitize input that may allow a remote attacker access to softcms with administrator's privilege through specially crafted input (sql injection).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-02-13\nLast Modified Date: 2017-06-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in emall/search.php in pre shopping mall 1.1 allows remote attackers to execute arbitrary sql commands via the search parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-05-08
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in emall/search.php in pre shopping mall 1.1 allows remote attackers to execute arbitrary sql commands via the search parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-08\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: bluetooth in apple os x before 10.12 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-09-25
Last Modified Date: 2017-07-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: bluetooth in apple os x before 10.12 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-09-25\nLast Modified Date: 2017-07-30",
"role": "assistant"
}
] |
CWE Code: 434
Vulnerability Type: privilege_escalation
CVSS Score: 4.4
CWE Name: Unrestricted Upload of File with Dangerous Type
Summary: code42 enterprise and crashplan for small business client version 6.7 before 6.7.5, 6.8 before 6.8.8, and 6.9 before 6.9.4 allows eval injection. a proxy auto-configuration file, crafted by a lesser privileged user, may be used to execute arbitrary code at a higher privilege as the service user.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-07-19
Last Modified Date: 2019-09-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Unrestricted Upload of File with Dangerous Type.",
"role": "user"
},
{
"content": "CWE Code: 434\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Unrestricted Upload of File with Dangerous Type\nSummary: code42 enterprise and crashplan for small business client version 6.7 before 6.7.5, 6.8 before 6.8.8, and 6.9 before 6.9.4 allows eval injection. a proxy auto-configuration file, crafted by a lesser privileged user, may be used to execute arbitrary code at a higher privilege as the service user.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-19\nLast Modified Date: 2019-09-18",
"role": "assistant"
}
] |
CWE Code: 285
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Improper Authorization
Summary: sap disclosure management, version 10.01, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-02-15
Last Modified Date: 2019-02-20 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Authorization.",
"role": "user"
},
{
"content": "CWE Code: 285\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Authorization\nSummary: sap disclosure management, version 10.01, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-02-15\nLast Modified Date: 2019-02-20",
"role": "assistant"
}
] |
CWE Code: 400
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Uncontrolled Resource Consumption
Summary: a vulnerability has been identified in simatic et 200sp open controller (all versions >= v2.0 and < v2.1.6), simatic s7-1500 software controller (all versions >= v2.0 and < v2.5), simatic s7-1500 incl. f (all versions >= v2.0 and < v2.5). an attacker can cause a denial-of-service condition on the network stack by sending a large number of specially crafted packets to the plc. the plc will lose its ability to communicate over the network. this vulnerability could be exploited by an attacker with network access to the affected systems. successful exploitation requires no privileges and no user interaction. an attacker could use this vulnerability to compromise availability of the network connectivity. at the time of advisory publication no public exploitation of this vulnerability was known.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2018-10-10
Last Modified Date: 2019-03-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Uncontrolled Resource Consumption.",
"role": "user"
},
{
"content": "CWE Code: 400\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Uncontrolled Resource Consumption\nSummary: a vulnerability has been identified in simatic et 200sp open controller (all versions >= v2.0 and < v2.1.6), simatic s7-1500 software controller (all versions >= v2.0 and < v2.5), simatic s7-1500 incl. f (all versions >= v2.0 and < v2.5). an attacker can cause a denial-of-service condition on the network stack by sending a large number of specially crafted packets to the plc. the plc will lose its ability to communicate over the network. this vulnerability could be exploited by an attacker with network access to the affected systems. successful exploitation requires no privileges and no user interaction. an attacker could use this vulnerability to compromise availability of the network connectivity. at the time of advisory publication no public exploitation of this vulnerability was known.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2018-10-10\nLast Modified Date: 2019-03-21",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in plikli cms 4.0.0 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to join_group.php or (2) comment_id parameter to story.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-01-03
Last Modified Date: 2019-01-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in plikli cms 4.0.0 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to join_group.php or (2) comment_id parameter to story.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-01-03\nLast Modified Date: 2019-01-14",
"role": "assistant"
}
] |
CWE Code: 863
Vulnerability Type: privilege_escalation
CVSS Score: 5.5
CWE Name: Incorrect Authorization
Summary: it was discovered that postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "insert ... on conflict do update". an attacker with "create table" privileges could exploit this to read arbitrary bytes server memory. if the attacker also had certain "insert" and limited "update" privileges to a particular table, they could exploit this to update other columns in the same table.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/NONE
Published Date: 2018-08-09
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Authorization.",
"role": "user"
},
{
"content": "CWE Code: 863\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Incorrect Authorization\nSummary: it was discovered that postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with \"insert ... on conflict do update\". an attacker with \"create table\" privileges could exploit this to read arbitrary bytes server memory. if the attacker also had certain \"insert\" and limited \"update\" privileges to a particular table, they could exploit this to update other columns in the same table.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2018-08-09\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in blog.php in netart media vlog system 1.1 allows remote attackers to execute arbitrary sql commands via the note parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-11
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in blog.php in netart media vlog system 1.1 allows remote attackers to execute arbitrary sql commands via the note parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-11\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: buffer overflow in iohidfamily in apple os x before 10.10.3 allows local users to gain privileges via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-04-10
Last Modified Date: 2019-01-31 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in iohidfamily in apple os x before 10.10.3 allows local users to gain privileges via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-04-10\nLast Modified Date: 2019-01-31",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Out-of-bounds Write
Summary: in the android kernel in bluetooth there is a possible out of bounds write due to a missing bounds check. this could lead to local escalation of privilege with system execution privileges needed. user interaction is not needed for exploitation.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-09-06
Last Modified Date: 2019-09-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Out-of-bounds Write\nSummary: in the android kernel in bluetooth there is a possible out of bounds write due to a missing bounds check. this could lead to local escalation of privilege with system execution privileges needed. user interaction is not needed for exploitation.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-06\nLast Modified Date: 2019-09-09",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: apinit on cray devices with cle before 4.2.up02 and 5.x before 5.1.up00 does not use alpsauth data to validate the uid in a launch message, which allows local users to gain privileges via a modified aprun program, aka id fn5912.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-12-27
Last Modified Date: 2014-12-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: apinit on cray devices with cle before 4.2.up02 and 5.x before 5.1.up00 does not use alpsauth data to validate the uid in a launch message, which allows local users to gain privileges via a modified aprun program, aka id fn5912.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-12-27\nLast Modified Date: 2014-12-30",
"role": "assistant"
}
] |
CWE Code: 189
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Numeric Errors
Summary: integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted agpioc_bind agp_ioctl ioctl call.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2011-05-09
Last Modified Date: 2014-01-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Numeric Errors.",
"role": "user"
},
{
"content": "CWE Code: 189\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Numeric Errors\nSummary: integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted agpioc_bind agp_ioctl ioctl call.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2011-05-09\nLast Modified Date: 2014-01-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in skalfa skalinks 1.5 allows remote attackers to execute arbitrary sql commands via the admin name field to the default uri under admin/.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-10
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in skalfa skalinks 1.5 allows remote attackers to execute arbitrary sql commands via the admin name field to the default uri under admin/.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-10\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the calendar program in bsdmainutils 6.0 through 6.0.14 does not drop root privileges when executed with the -a flag, which allows attackers to execute arbitrary commands via a calendar event file.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2004-10-20
Last Modified Date: 2017-07-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the calendar program in bsdmainutils 6.0 through 6.0.14 does not drop root privileges when executed with the -a flag, which allows attackers to execute arbitrary commands via a calendar event file.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2004-10-20\nLast Modified Date: 2017-07-11",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Permissions Privileges and Access Controls
Summary: microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 sp2 and r2, and windows 7 allow local users to gain privileges by leveraging access to a process with networkservice credentials, as demonstrated by tapi server, sql server, and iis processes, and related to the windows service isolation feature. note: the vendor states that privilege escalation from networkservice to localsystem does not cross a "security boundary."
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-08-16
Last Modified Date: 2018-10-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 sp2 and r2, and windows 7 allow local users to gain privileges by leveraging access to a process with networkservice credentials, as demonstrated by tapi server, sql server, and iis processes, and related to the windows service isolation feature. note: the vendor states that privilege escalation from networkservice to localsystem does not cross a \"security boundary.\"\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-08-16\nLast Modified Date: 2018-10-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in web slider 0.6 allows remote attackers to execute arbitrary sql commands via the slide parameter in a slides action. note: the provenance of this information is unknown; the details are obtained solely from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-05-23
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in web slider 0.6 allows remote attackers to execute arbitrary sql commands via the slide parameter in a slides action. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-23\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: an elevation of privilege vulnerability exists in the way that the windows network file system (nfs) handles objects in memory, aka 'windows network file system elevation of privilege vulnerability'.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-06-12
Last Modified Date: 2019-06-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability exists in the way that the windows network file system (nfs) handles objects in memory, aka 'windows network file system elevation of privilege vulnerability'.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-12\nLast Modified Date: 2019-06-13",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 4.4
CWE Name: Improper Access Control
Summary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in takeover of oracle vm virtualbox. cvss 3.0 base score 7.8 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:h/pr:l/ui:n/s:c/c:h/i:h/a:h).
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-01-16
Last Modified Date: 2019-06-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in takeover of oracle vm virtualbox. cvss 3.0 base score 7.8 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:h/pr:l/ui:n/s:c/c:h/i:h/a:h).\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-01-16\nLast Modified Date: 2019-06-11",
"role": "assistant"
}
] |
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Untrusted Search Path
Summary: untrusted search path vulnerability in installer of ip messenger for win 4.60 and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-08-04
Last Modified Date: 2017-08-23 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in installer of ip messenger for win 4.60 and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-08-04\nLast Modified Date: 2017-08-23",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Out-of-bounds Write
Summary: in updateloadelement of ic.cc, there is a possible out-of-bounds write due to type confusion. this could lead to remote code execution in the proxy auto-config with no additional execution privileges needed. user interaction is not needed for exploitation. product: android versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9 android id: a-117607414
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-05-08
Last Modified Date: 2019-05-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Out-of-bounds Write\nSummary: in updateloadelement of ic.cc, there is a possible out-of-bounds write due to type confusion. this could lead to remote code execution in the proxy auto-config with no additional execution privileges needed. user interaction is not needed for exploitation. product: android versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9 android id: a-117607414\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-05-08\nLast Modified Date: 2019-05-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sugarcrm before 8.0.4 and 9.x before 9.0.2 allows sql injection in the pmse_inbox module by an admin user.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-10-07
Last Modified Date: 2019-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sugarcrm before 8.0.4 and 9.x before 9.0.2 allows sql injection in the pmse_inbox module by an admin user.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-10-07\nLast Modified Date: 2019-10-10",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Permissions Privileges and Access Controls
Summary: inc_newuser.asp in hosting controller 6.1 hot fix 3.3 and earlier allows remote authenticated users to change the permissions of directories named (1) db, (2) www, (3) special, and (4) log at arbitrary locations under the web root via a modified dirroot parameter in an adduser action to accounts/accountactions.asp. note: this can be leveraged for remote code execution by changing the permissions of \forum\db, which is configured for execution of asp scripts with administrative privileges, and then uploading a script to \forum\db.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-12-20
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: inc_newuser.asp in hosting controller 6.1 hot fix 3.3 and earlier allows remote authenticated users to change the permissions of directories named (1) db, (2) www, (3) special, and (4) log at arbitrary locations under the web root via a modified dirroot parameter in an adduser action to accounts/accountactions.asp. note: this can be leveraged for remote code execution by changing the permissions of \\forum\\db, which is configured for execution of asp scripts with administrative privileges, and then uploading a script to \\forum\\db.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-12-20\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Permissions Privileges and Access Controls
Summary: dasauto in ibm db2 8 before fp18, 9.1 before fp8, 9.5 before fp4, and 9.7 before fp1 permits execution by unprivileged user accounts, which has unspecified impact and local attack vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-12-02
Last Modified Date: 2009-12-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: dasauto in ibm db2 8 before fp18, 9.1 before fp8, 9.5 before fp4, and 9.7 before fp1 permits execution by unprivileged user accounts, which has unspecified impact and local attack vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-02\nLast Modified Date: 2009-12-07",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Permissions Privileges and Access Controls
Summary: insecure permissions of the section object global\pandadevicesagentsharedmemory and the event global\pandadevicesagentsharedmemorychange in panda products before 18.07.03 allow attackers to queue an event (as an encrypted json string) to the system service agentsvc.exe, which leads to privilege escalation when the cmdlineexecute event is queued. this affects panda antivirus, panda antivirus pro, panda dome, panda global protection, panda gold protection, and panda internet security.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-05-23
Last Modified Date: 2019-05-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: insecure permissions of the section object global\\pandadevicesagentsharedmemory and the event global\\pandadevicesagentsharedmemorychange in panda products before 18.07.03 allow attackers to queue an event (as an encrypted json string) to the system service agentsvc.exe, which leads to privilege escalation when the cmdlineexecute event is queued. this affects panda antivirus, panda antivirus pro, panda dome, panda global protection, panda gold protection, and panda internet security.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-05-23\nLast Modified Date: 2019-05-28",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the kernel in apple mac os x 10.4 through 10.4.10 allows local users to gain privileges by executing setuid or setgid programs in which the stdio, stderr, or stdout file descriptors are "in an unexpected state."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2007-11-15
Last Modified Date: 2017-07-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the kernel in apple mac os x 10.4 through 10.4.10 allows local users to gain privileges by executing setuid or setgid programs in which the stdio, stderr, or stdout file descriptors are \"in an unexpected state.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2007-11-15\nLast Modified Date: 2017-07-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in image/view.php in candid allows remote attackers to execute arbitrary sql commands via the image_id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-11-01
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in image/view.php in candid allows remote attackers to execute arbitrary sql commands via the image_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-01\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in hp intelligent management center (imc) and hp imc service operation management software module allows remote attackers to execute arbitrary sql commands via unspecified vectors, aka zdi-can-1664.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2013-10-13
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in hp intelligent management center (imc) and hp imc service operation management software module allows remote attackers to execute arbitrary sql commands via unspecified vectors, aka zdi-can-1664.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-10-13\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in modules/calendar/json.php in group-office community before 4.0.90 allows remote authenticated users to execute arbitrary sql commands via the sort parameter.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-09-11
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in modules/calendar/json.php in group-office community before 4.0.90 allows remote authenticated users to execute arbitrary sql commands via the sort parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-09-11\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Information Exposure
Summary: in generateservicesmap of registeredservicescache.java, there is a possible account protection bypass due to a caching optimization. this could lead to local information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation.product: androidversions: android-9 android-10android id: a-136261465
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-10-11
Last Modified Date: 2019-10-16 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Information Exposure\nSummary: in generateservicesmap of registeredservicescache.java, there is a possible account protection bypass due to a caching optimization. this could lead to local information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation.product: androidversions: android-9 android-10android id: a-136261465\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-10-11\nLast Modified Date: 2019-10-16",
"role": "assistant"
}
] |
CWE Code: 399
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Resource Management Errors
Summary: the (1) krshd and (2) v4rcp applications in (a) mit kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on linux and aix, and (b) heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2006-08-09
Last Modified Date: 2018-10-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Resource Management Errors.",
"role": "user"
},
{
"content": "CWE Code: 399\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Resource Management Errors\nSummary: the (1) krshd and (2) v4rcp applications in (a) mit kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on linux and aix, and (b) heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2006-08-09\nLast Modified Date: 2018-10-18",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the mannschaftsliste (kiddog_playerlist) 1.0.3 and earlier extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-22
Last Modified Date: 2011-03-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the mannschaftsliste (kiddog_playerlist) 1.0.3 and earlier extension for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-22\nLast Modified Date: 2011-03-08",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Improper Input Validation
Summary: dotnetnuke 2.0 through 4.8.4 allows remote attackers to load .ascx files instead of skin files, and possibly access privileged functionality, via unknown vectors related to parameter validation.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-08-27
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Improper Input Validation\nSummary: dotnetnuke 2.0 through 4.8.4 allows remote attackers to load .ascx files instead of skin files, and possibly access privileged functionality, via unknown vectors related to parameter validation.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-08-27\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in the dj-catalog (com_djcatalog) component for joomla! allow remote attackers to execute arbitrary sql commands via the (1) id parameter in a showitem action and (2) cid parameter in a show action to index.php.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-10-11
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the dj-catalog (com_djcatalog) component for joomla! allow remote attackers to execute arbitrary sql commands via the (1) id parameter in a showitem action and (2) cid parameter in a show action to index.php.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-10-11\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.6
CWE Name: Permissions Privileges and Access Controls
Summary: the default configuration in the red hat openstack-neutron package before 2013.2.3-7 does not properly set a configuration file for rootwrap, which allows remote attackers to gain privileges via a crafted configuration file.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-06-02
Last Modified Date: 2018-10-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: the default configuration in the red hat openstack-neutron package before 2013.2.3-7 does not properly set a configuration file for rootwrap, which allows remote attackers to gain privileges via a crafted configuration file.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-06-02\nLast Modified Date: 2018-10-19",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: realnetworks gamehouse realarcade installer (aka activemark game installer) 2.6.0.481 and 3.0.7 uses weak permissions (create files/write data) for the gamehouse games directory tree, which allows local users to gain privileges via a trojan horse dll in an individual game's directory, as demonstrated by ddraw.dll in the zuma deluxe directory.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-01-12
Last Modified Date: 2015-01-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: realnetworks gamehouse realarcade installer (aka activemark game installer) 2.6.0.481 and 3.0.7 uses weak permissions (create files/write data) for the gamehouse games directory tree, which allows local users to gain privileges via a trojan horse dll in an individual game's directory, as demonstrated by ddraw.dll in the zuma deluxe directory.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-01-12\nLast Modified Date: 2015-01-13",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in default.asp in ocean12 faq manager pro 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter in a cat action. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-03-02
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in default.asp in ocean12 faq manager pro 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter in a cat action. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-02\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection exists in the checklist 1.1.1 component for joomla! via the title_search, tag_search, name_search, description_search, or filter_order parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-02-22
Last Modified Date: 2018-03-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in the checklist 1.1.1 component for joomla! via the title_search, tag_search, name_search, description_search, or filter_order parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-02-22\nLast Modified Date: 2018-03-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in index.php in mambo before 4.6.4, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) articleid and (2) mcname parameters. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-05-28
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in mambo before 4.6.4, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) articleid and (2) mcname parameters. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-28\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: xm^online 2 common utils and endpoints 0.2.1 allows sql injection, related to constants.java, dropschemaresolver.java, and schemachangeresolver.java.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-08-26
Last Modified Date: 2019-08-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: xm^online 2 common utils and endpoints 0.2.1 allows sql injection, related to constants.java, dropschemaresolver.java, and schemachangeresolver.java.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-26\nLast Modified Date: 2019-08-30",
"role": "assistant"
}
] |
CWE Code: 254
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: 7PK - Security Features
Summary: a security vulnerability in hpe smart update manager (sum) prior to v8.4 could allow local unauthorized elevation of privilege.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-06-05
Last Modified Date: 2019-06-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: 7PK - Security Features.",
"role": "user"
},
{
"content": "CWE Code: 254\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: 7PK - Security Features\nSummary: a security vulnerability in hpe smart update manager (sum) prior to v8.4 could allow local unauthorized elevation of privilege.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-06-05\nLast Modified Date: 2019-06-05",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: the mediatek gps driver in android before 2016-07-05 on android one devices allows attackers to gain privileges via a crafted application, aka android internal bug 28174914 and mediatek internal bug alps02688853.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-07-11
Last Modified Date: 2016-07-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: the mediatek gps driver in android before 2016-07-05 on android one devices allows attackers to gain privileges via a crafted application, aka android internal bug 28174914 and mediatek internal bug alps02688853.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-11\nLast Modified Date: 2016-07-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: ibm maximo asset management 7.6 through 7.6.3 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 145968.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-08-24
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: ibm maximo asset management 7.6 through 7.6.3 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 145968.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-08-24\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Out-of-bounds Write
Summary: a elevation of privilege vulnerability in the android media framework. product: android. versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-35421151.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-07-06
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Out-of-bounds Write\nSummary: a elevation of privilege vulnerability in the android media framework. product: android. versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-35421151.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-07-06\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in readbible.php in free bible search php script 1.0 allows remote attackers to execute arbitrary sql commands via the version parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-01-29
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in readbible.php in free bible search php script 1.0 allows remote attackers to execute arbitrary sql commands via the version parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-01-29\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an issue was discovered in certain apple products. macos before 10.13.5 is affected. the issue involves the "iohidfamily" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-06-08
Last Modified Date: 2018-07-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. macos before 10.13.5 is affected. the issue involves the \"iohidfamily\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-06-08\nLast Modified Date: 2018-07-13",
"role": "assistant"
}
] |
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Untrusted Search Path
Summary: untrusted search path vulnerability in content manager assistant for playstation version 3.55.7671.0901 and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-27
Last Modified Date: 2018-01-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in content manager assistant for playstation version 3.55.7671.0901 and earlier allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-27\nLast Modified Date: 2018-01-11",
"role": "assistant"
}
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.