text
stringlengths
365
3.97k
conversations
listlengths
3
3
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: a sql injection issue was discovered in nagios xi before 5.4.13 via the admin/commandline.php cname parameter. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-05-16 Last Modified Date: 2018-06-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection issue was discovered in nagios xi before 5.4.13 via the admin/commandline.php cname parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-05-16\nLast Modified Date: 2018-06-15", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 5.5 CWE Name: Improper Input Validation Summary: the management console in symantec endpoint protection manager (sepm) 12.1 before 12.1-ru6-mp1 allows remote authenticated users to write to arbitrary files, and consequently obtain administrator privileges, via a crafted filename. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/PARTIAL Published Date: 2015-08-01 Last Modified Date: 2017-09-21
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Input Validation\nSummary: the management console in symantec endpoint protection manager (sepm) 12.1 before 12.1-ru6-mp1 allows remote authenticated users to write to arbitrary files, and consequently obtain administrator privileges, via a crafted filename.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/PARTIAL\nPublished Date: 2015-08-01\nLast Modified Date: 2017-09-21", "role": "assistant" } ]
CWE Code: 416 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Use After Free Summary: in the android kernel in the synaptics_dsx_htc touchscreen driver there is a possible out of bounds write due to a use after free. this could lead to a local escalation of privilege with system execution privileges needed. user interaction is not needed for exploitation. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-09-06 Last Modified Date: 2019-09-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Use After Free.", "role": "user" }, { "content": "CWE Code: 416\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Use After Free\nSummary: in the android kernel in the synaptics_dsx_htc touchscreen driver there is a possible out of bounds write due to a use after free. this could lead to a local escalation of privilege with system execution privileges needed. user interaction is not needed for exploitation.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-06\nLast Modified Date: 2019-09-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in main_bigware_43.php in bigware shop before 2.1.5 allows remote attackers to execute arbitrary sql commands via the lastname parameter in a process action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2012-10-08 Last Modified Date: 2012-10-24
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in main_bigware_43.php in bigware shop before 2.1.5 allows remote attackers to execute arbitrary sql commands via the lastname parameter in a process action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-10-08\nLast Modified Date: 2012-10-24", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in lpro.php in free links directory script (flds) 1.2a allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-12-30 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in lpro.php in free links directory script (flds) 1.2a allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-30\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 5.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: a sql injection issue was discovered in ecava integraxor v 6.1.1030.1 and prior. the sql injection vulnerability has been identified, which generates an error in the database log. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2017-12-20 Last Modified Date: 2018-01-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection issue was discovered in ecava integraxor v 6.1.1030.1 and prior. the sql injection vulnerability has been identified, which generates an error in the database log.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2017-12-20\nLast Modified Date: 2018-01-04", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in frs/shownotes.php in gforge 4.5.19 and earlier allows remote attackers to execute arbitrary sql commands via the release_id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-02-19 Last Modified Date: 2017-10-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in frs/shownotes.php in gforge 4.5.19 and earlier allows remote attackers to execute arbitrary sql commands via the release_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-19\nLast Modified Date: 2017-10-19", "role": "assistant" } ]
CWE Code: 362 Vulnerability Type: privilege_escalation CVSS Score: 7.6 CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Summary: in bta_hl_sdp_query_results of bta_hl_main.cc, there is a possible use-after-free due to a race condition. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9. android id: a-116222069. Access Authentication: NONE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-02-28 Last Modified Date: 2019-03-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').", "role": "user" }, { "content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: in bta_hl_sdp_query_results of bta_hl_main.cc, there is a possible use-after-free due to a race condition. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9. android id: a-116222069.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-02-28\nLast Modified Date: 2019-03-01", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 5.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in open business management (obm) 2.4.0-rc13 and probably earlier allow remote authenticated users to execute arbitrary sql commands via the (1) sel_domain_id or (2) action parameter to obm.php; (3) tf_user parameter in a search action to group/group_index.php; (4) tf_delegation, (5) tf_ip, (6) tf_name to host/host_index.php; or (7) lang, (8) theme, (9) cal_alert, (10) cal_first_hour, (11) cal_interval, (12) cal_last_hour, (13) commentorder, (14) csv_sep, (15) date, (16) date_upd, (17) debug_exe, (18) debug_id, (19) debug_param, (20) debug_sess, (21) debug_solr, (22) debug_sql, (23) dsrc, (24) menu, (25) rows, (26) sel_display_days, (27) timeformat, (28) timezone, or (29) todo parameter to settings/settings_index.php. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/NONE Published Date: 2012-08-31 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in open business management (obm) 2.4.0-rc13 and probably earlier allow remote authenticated users to execute arbitrary sql commands via the (1) sel_domain_id or (2) action parameter to obm.php; (3) tf_user parameter in a search action to group/group_index.php; (4) tf_delegation, (5) tf_ip, (6) tf_name to host/host_index.php; or (7) lang, (8) theme, (9) cal_alert, (10) cal_first_hour, (11) cal_interval, (12) cal_last_hour, (13) commentorder, (14) csv_sep, (15) date, (16) date_upd, (17) debug_exe, (18) debug_id, (19) debug_param, (20) debug_sess, (21) debug_solr, (22) debug_sql, (23) dsrc, (24) menu, (25) rows, (26) sel_display_days, (27) timeformat, (28) timezone, or (29) todo parameter to settings/settings_index.php.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2012-08-31\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: an issue was discovered in certain apple products. macos before 10.13.1 is affected. the issue involves the "cfnetwork" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-11-13 Last Modified Date: 2017-11-27
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. macos before 10.13.1 is affected. the issue involves the \"cfnetwork\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-11-13\nLast Modified Date: 2017-11-27", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: kohana through 3.3.6 has sql injection when the order_by() parameter can be controlled. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-02-21 Last Modified Date: 2019-04-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: kohana through 3.3.6 has sql injection when the order_by() parameter can be controlled.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-02-21\nLast Modified Date: 2019-04-12", "role": "assistant" } ]
CWE Code: 400 Vulnerability Type: privilege_escalation CVSS Score: 4.9 CWE Name: Uncontrolled Resource Consumption Summary: memory leak in hw/9pfs/9p-proxy.c in qemu (aka quick emulator) allows local privileged guest os users to cause a denial of service (host memory consumption and possibly qemu process crash) by leveraging a missing cleanup operation in the proxy backend. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2016-12-29 Last Modified Date: 2018-09-07
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Uncontrolled Resource Consumption.", "role": "user" }, { "content": "CWE Code: 400\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Uncontrolled Resource Consumption\nSummary: memory leak in hw/9pfs/9p-proxy.c in qemu (aka quick emulator) allows local privileged guest os users to cause a denial of service (host memory consumption and possibly qemu process crash) by leveraging a missing cleanup operation in the proxy backend.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2016-12-29\nLast Modified Date: 2018-09-07", "role": "assistant" } ]
CWE Code: 787 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Out-of-bounds Write Summary: in persist_set_key and other functions of cryptfs.cpp, there is a possible out-of-bounds write due to an uncaught error. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9. android id: a-112731440. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-12-06 Last Modified Date: 2019-01-02
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Write.", "role": "user" }, { "content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Out-of-bounds Write\nSummary: in persist_set_key and other functions of cryptfs.cpp, there is a possible out-of-bounds write due to an uncaught error. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9. android id: a-112731440.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-12-06\nLast Modified Date: 2019-01-02", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: netiq privileged account manager before 3.1 patch update 3 allowed cross site scripting attacks via the "type" and "account" parameters of json requests. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2018-03-05 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: netiq privileged account manager before 3.1 patch update 3 allowed cross site scripting attacks via the \"type\" and \"account\" parameters of json requests.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2018-03-05\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the wbce cms 1.1.10 and earlier allows attacker with administrator rights to execute arbitrary sql commands via unspecified vectors. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-04-28 Last Modified Date: 2017-05-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the wbce cms 1.1.10 and earlier allows attacker with administrator rights to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-04-28\nLast Modified Date: 2017-05-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in gallery.php in easy photo gallery (aka ezphotogallery) 2.1 allows remote attackers to execute arbitrary sql commands via the password parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-08-19 Last Modified Date: 2009-08-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in gallery.php in easy photo gallery (aka ezphotogallery) 2.1 allows remote attackers to execute arbitrary sql commands via the password parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-08-19\nLast Modified Date: 2009-08-19", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Improper Input Validation Summary: services/audioflinger/effects.cpp in mediaserver in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 does not validate the reply size for an audioflinger effect command, which allows attackers to gain privileges via a crafted application, aka internal bug 29251553. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-08-05 Last Modified Date: 2016-11-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Input Validation\nSummary: services/audioflinger/effects.cpp in mediaserver in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 does not validate the reply size for an audioflinger effect command, which allows attackers to gain privileges via a crafted application, aka internal bug 29251553.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-08-05\nLast Modified Date: 2016-11-28", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the photo gallery plugin 1.2.7 for wordpress allows remote attackers to execute arbitrary sql commands via the order_by parameter in a gallerybox action to wp-admin/admin-ajax.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2015-01-16 Last Modified Date: 2019-07-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the photo gallery plugin 1.2.7 for wordpress allows remote attackers to execute arbitrary sql commands via the order_by parameter in a gallerybox action to wp-admin/admin-ajax.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-01-16\nLast Modified Date: 2019-07-08", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in opencart 1.1.8 allows remote attackers to execute arbitrary sql commands via the order parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-03-20 Last Modified Date: 2018-10-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in opencart 1.1.8 allows remote attackers to execute arbitrary sql commands via the order parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-20\nLast Modified Date: 2018-10-10", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 3.5 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: cross-site scripting (xss) vulnerability in index.php in the link module 5.x-2.5 for drupal 5.10 allows remote authenticated users, with "administer content types" privileges, to inject arbitrary web script or html via the description parameter (aka the help field). note: some of these details are obtained from third party information. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2009-02-16 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: cross-site scripting (xss) vulnerability in index.php in the link module 5.x-2.5 for drupal 5.10 allows remote authenticated users, with \"administer content types\" privileges, to inject arbitrary web script or html via the description parameter (aka the help field). note: some of these details are obtained from third party information.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2009-02-16\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Input Validation Summary: drivers/media/platform/msm/camera_v2/sensor/csid/msm_csid.c in the qualcomm components in android before 2016-08-05 on nexus 5 and 7 (2013) devices does not validate a certain parameter, which allows attackers to gain privileges via a crafted application, aka android internal bug 28747684 and qualcomm internal bug cr511358. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-08-06 Last Modified Date: 2016-11-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Input Validation\nSummary: drivers/media/platform/msm/camera_v2/sensor/csid/msm_csid.c in the qualcomm components in android before 2016-08-05 on nexus 5 and 7 (2013) devices does not validate a certain parameter, which allows attackers to gain privileges via a crafted application, aka android internal bug 28747684 and qualcomm internal bug cr511358.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-08-06\nLast Modified Date: 2016-11-28", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 9.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: a sql injection code execution vulnerability was identified in hpe intelligent management center (imc) plat earlier than version 7.3 e0506p09. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-06-05 Last Modified Date: 2019-06-07
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 9.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection code execution vulnerability was identified in hpe intelligent management center (imc) plat earlier than version 7.3 e0506p09.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-05\nLast Modified Date: 2019-06-07", "role": "assistant" } ]
CWE Code: 610 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Externally Controlled Reference to a Resource in Another Sphere Summary: in the activity manager service, there is a possible information disclosure due to a confused deputy. this could lead to local disclosure of current foreground process with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-115384617 Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-09-27 Last Modified Date: 2019-10-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Externally Controlled Reference to a Resource in Another Sphere.", "role": "user" }, { "content": "CWE Code: 610\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Externally Controlled Reference to a Resource in Another Sphere\nSummary: in the activity manager service, there is a possible information disclosure due to a confused deputy. this could lead to local disclosure of current foreground process with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-115384617\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-01", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in dopbs-backend-forms.php in the booking system (booking calendar) plugin before 1.3 for wordpress allows remote authenticated users to execute arbitrary sql commands via the booking_form_id parameter to wp-admin/admin-ajax.php. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2014-05-22 Last Modified Date: 2018-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in dopbs-backend-forms.php in the booking system (booking calendar) plugin before 1.3 for wordpress allows remote authenticated users to execute arbitrary sql commands via the booking_form_id parameter to wp-admin/admin-ajax.php.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-05-22\nLast Modified Date: 2018-10-09", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Input Validation Summary: the kernel in microsoft windows 2000 sp4, xp sp2 and sp3, server 2003 sp2, vista gold, sp1, and sp2, and server 2008 sp2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka "windows kernel desktop vulnerability." Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2009-06-10 Last Modified Date: 2019-02-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: the kernel in microsoft windows 2000 sp4, xp sp2 and sp3, server 2003 sp2, vista gold, sp1, and sp2, and server 2008 sp2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka \"windows kernel desktop vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2009-06-10\nLast Modified Date: 2019-02-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in graph.php in cacti 0.8.7e and earlier allows remote attackers to execute arbitrary sql commands via a crafted rra_id parameter in a get request in conjunction with a valid rra_id value in a post request or a cookie, which causes the post or cookie value to bypass the validation routine, but inserts the $_get value into the resulting query. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-05-27 Last Modified Date: 2012-02-16
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in graph.php in cacti 0.8.7e and earlier allows remote attackers to execute arbitrary sql commands via a crafted rra_id parameter in a get request in conjunction with a valid rra_id value in a post request or a cookie, which causes the post or cookie value to bypass the validation routine, but inserts the $_get value into the resulting query.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-05-27\nLast Modified Date: 2012-02-16", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in index.php in escon supportportal pro 3.0 allow remote attackers to execute arbitrary sql commands via the (1) cat and (2) tid parameters. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-07-27 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in escon supportportal pro 3.0 allow remote attackers to execute arbitrary sql commands via the (1) cat and (2) tid parameters.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-07-27\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in announcements.php in siteengine 5.x allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-12-01 Last Modified Date: 2018-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in announcements.php in siteengine 5.x allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-12-01\nLast Modified Date: 2018-10-11", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: huawei smart phones with software earlier than vie-l09c40b360 versions have a buffer overflow vulnerability due to the lack of parameter validation. an attacker tricks a user into installing a malicious app which has the root privilege; the app can send a specific parameter to the smart phone, causing the smartphone restart or arbitrary code execution. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-11-22 Last Modified Date: 2017-12-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: huawei smart phones with software earlier than vie-l09c40b360 versions have a buffer overflow vulnerability due to the lack of parameter validation. an attacker tricks a user into installing a malicious app which has the root privilege; the app can send a specific parameter to the smart phone, causing the smartphone restart or arbitrary code execution.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-11-22\nLast Modified Date: 2017-12-08", "role": "assistant" } ]
CWE Code: 190 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Integer Overflow or Wraparound Summary: integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-02-17 Last Modified Date: 2017-11-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.", "role": "user" }, { "content": "CWE Code: 190\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Integer Overflow or Wraparound\nSummary: integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-02-17\nLast Modified Date: 2017-11-04", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the wp_untrash_post_comments function in wp-includes/post.php in wordpress before 4.2.4 allows remote attackers to execute arbitrary sql commands via a comment that is mishandled after retrieval from the trash. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2015-11-09 Last Modified Date: 2017-11-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the wp_untrash_post_comments function in wp-includes/post.php in wordpress before 4.2.4 allows remote attackers to execute arbitrary sql commands via a comment that is mishandled after retrieval from the trash.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-11-09\nLast Modified Date: 2017-11-04", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Input Validation Summary: aavmker4.sys in avast! 4.8 through 4.8.1368.0 and 5.0 before 5.0.418.0 running on windows 2000 and xp does not properly validate input to ioctl 0xb2d60030, which allows local users to cause a denial of service (system crash) or execute arbitrary code to gain privileges via ioctl requests using crafted kernel addresses that trigger memory corruption. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2010-02-25 Last Modified Date: 2018-10-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: aavmker4.sys in avast! 4.8 through 4.8.1368.0 and 5.0 before 5.0.418.0 running on windows 2000 and xp does not properly validate input to ioctl 0xb2d60030, which allows local users to cause a denial of service (system crash) or execute arbitrary code to gain privileges via ioctl requests using crafted kernel addresses that trigger memory corruption.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-02-25\nLast Modified Date: 2018-10-10", "role": "assistant" } ]
CWE Code: 426 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Untrusted Search Path Summary: untrusted search path vulnerability in the installer of e-tax software all versions allows remote attackers to gain privileges via a trojan horse dll in an unspecified directory. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-05-22 Last Modified Date: 2017-05-31
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Untrusted Search Path.", "role": "user" }, { "content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in the installer of e-tax software all versions allows remote attackers to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-05-22\nLast Modified Date: 2017-05-31", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 3.5 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: microsoft sharepoint foundation 2013 sp1 allows an elevation of privilege vulnerability when it does not properly sanitize a specially crafted web request, aka "microsoft sharepoint xss vulnerability". Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2017-05-12 Last Modified Date: 2017-05-23
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: microsoft sharepoint foundation 2013 sp1 allows an elevation of privilege vulnerability when it does not properly sanitize a specially crafted web request, aka \"microsoft sharepoint xss vulnerability\".\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2017-05-12\nLast Modified Date: 2017-05-23", "role": "assistant" } ]
CWE Code: 22 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Summary: an issue was discovered in the cloud controller api in cloud foundry foundation capi-release versions prior to v1.35.0 and cf-release versions prior to v268. a filesystem traversal vulnerability exists in the cloud controller that allows a space developer to escalate privileges by pushing a specially crafted application that can write arbitrary files to the cloud controller vm. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-07-25 Last Modified Date: 2017-11-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal').", "role": "user" }, { "content": "CWE Code: 22\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\nSummary: an issue was discovered in the cloud controller api in cloud foundry foundation capi-release versions prior to v1.35.0 and cf-release versions prior to v268. a filesystem traversal vulnerability exists in the cloud controller that allows a space developer to escalate privileges by pushing a specially crafted application that can write arbitrary files to the cloud controller vm.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-07-25\nLast Modified Date: 2017-11-08", "role": "assistant" } ]
CWE Code: 59 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Link Resolution Before File Access ('Link Following') Summary: in some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. under those circumstances osquery will load said malicious executable with system permissions. the solution is to migrate installations to the 'program files' directory on windows which restricts unprivileged write access. this issue affects osquery prior to v3.4.0. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-06-03 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Link Resolution Before File Access ('Link Following').", "role": "user" }, { "content": "CWE Code: 59\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Link Resolution Before File Access ('Link Following')\nSummary: in some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. under those circumstances osquery will load said malicious executable with system permissions. the solution is to migrate installations to the 'program files' directory on windows which restricts unprivileged write access. this issue affects osquery prior to v3.4.0.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-03\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in manageengine applications manager 9.x and 10.x allow remote attackers to execute arbitrary sql commands via the (1) viewid parameter to fault/alarmview.do or (2) period parameter to showhistorydata.do. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2012-02-14 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in manageengine applications manager 9.x and 10.x allow remote attackers to execute arbitrary sql commands via the (1) viewid parameter to fault/alarmview.do or (2) period parameter to showhistorydata.do.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-02-14\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 59 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Link Resolution Before File Access ('Link Following') Summary: a privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. it's possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-08-01 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Link Resolution Before File Access ('Link Following').", "role": "user" }, { "content": "CWE Code: 59\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Link Resolution Before File Access ('Link Following')\nSummary: a privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. it's possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-08-01\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Information Exposure Summary: in freebsd before 11.1-stable(r332303), 11.1-release-p10, 10.4-stable(r332321), and 10.4-release-p9, due to insufficient initialization of memory copied to userland in the linux subsystem and atheros wireless driver, small amounts of kernel memory may be disclosed to userland processes. unprivileged authenticated local users may be able to access small amounts of privileged kernel data. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2018-05-08 Last Modified Date: 2018-06-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Information Exposure\nSummary: in freebsd before 11.1-stable(r332303), 11.1-release-p10, 10.4-stable(r332321), and 10.4-release-p9, due to insufficient initialization of memory copied to userland in the linux subsystem and atheros wireless driver, small amounts of kernel memory may be disclosed to userland processes. unprivileged authenticated local users may be able to access small amounts of privileged kernel data.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-05-08\nLast Modified Date: 2018-06-13", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: the nicm.sys kernel driver 3.1.11.0 in novell client 4.91 sp5 on windows xp and windows server 2003; novell client 2 sp2 on windows vista and windows server 2008; and novell client 2 sp3 on windows server 2008 r2, windows 7, windows 8, and windows server 2012 allows local users to gain privileges via a crafted 0x143b6b ioctl call. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2013-07-31 Last Modified Date: 2013-08-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the nicm.sys kernel driver 3.1.11.0 in novell client 4.91 sp5 on windows xp and windows server 2003; novell client 2 sp2 on windows vista and windows server 2008; and novell client 2 sp3 on windows server 2008 r2, windows 7, windows 8, and windows server 2012 allows local users to gain privileges via a crafted 0x143b6b ioctl call.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-07-31\nLast Modified Date: 2013-08-22", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Improper Privilege Management Summary: an elevation of privilege vulnerability exists in windows audio service when a malformed parameter is processed, aka 'windows audio service elevation of privilege vulnerability'. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-09-11 Last Modified Date: 2019-09-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Privilege Management\nSummary: an elevation of privilege vulnerability exists in windows audio service when a malformed parameter is processed, aka 'windows audio service elevation of privilege vulnerability'.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-11\nLast Modified Date: 2019-09-12", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Permissions Privileges and Access Controls Summary: newsscript.pl for newsscript allows remote attackers to gain privileges by setting the mode parameter to admin. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2005-05-02 Last Modified Date: 2009-04-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: newsscript.pl for newsscript allows remote attackers to gain privileges by setting the mode parameter to admin.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2005-05-02\nLast Modified Date: 2009-04-03", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Input Validation Summary: iokit in apple ios before 8 and apple tv before 7 does not properly validate iodataqueue object metadata, which allows attackers to execute arbitrary code in a privileged context via an application that provides crafted values in unspecified metadata fields, a different vulnerability than cve-2014-4388. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2014-09-18 Last Modified Date: 2019-03-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Input Validation\nSummary: iokit in apple ios before 8 and apple tv before 7 does not properly validate iodataqueue object metadata, which allows attackers to execute arbitrary code in a privileged context via an application that provides crafted values in unspecified metadata fields, a different vulnerability than cve-2014-4388.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-09-18\nLast Modified Date: 2019-03-08", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in iptbb 0.5.4 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter in a viewdir action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-01-04 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in iptbb 0.5.4 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter in a viewdir action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-01-04\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 190 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Integer Overflow or Wraparound Summary: in the hidp_process_report in bluetooth, there is an integer overflow. this could lead to an out of bounds write with no additional execution privileges needed. user interaction is not needed for exploitation. product: android versions: android kernel android id: a-65853588 references: upstream kernel. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-11-06 Last Modified Date: 2019-08-06
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.", "role": "user" }, { "content": "CWE Code: 190\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Integer Overflow or Wraparound\nSummary: in the hidp_process_report in bluetooth, there is an integer overflow. this could lead to an out of bounds write with no additional execution privileges needed. user interaction is not needed for exploitation. product: android versions: android kernel android id: a-65853588 references: upstream kernel.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-11-06\nLast Modified Date: 2019-08-06", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: sql_injection CVSS Score: 3.5 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: cross-site scripting (xss) vulnerability in isql*plus (isqlplus) in oracle9i database server release 2 9.0.2.4 allows remote attackers to inject arbitrary web script or html via script in the "set markup html table" command, which is executed when the user selects a table. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2005-10-14 Last Modified Date: 2017-07-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: sql_injection\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: cross-site scripting (xss) vulnerability in isql*plus (isqlplus) in oracle9i database server release 2 9.0.2.4 allows remote attackers to inject arbitrary web script or html via script in the \"set markup html table\" command, which is executed when the user selects a table.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2005-10-14\nLast Modified Date: 2017-07-11", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in the tapatalk plugin 4.9.0 and earlier and 5.x through 5.2.1 for vbulletin allow remote attackers to execute arbitrary sql commands via a crafted xmlrpc api request to (1) unsubscribe_forum.php or (2) unsubscribe_topic.php in mobiquo/functions/. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-10-26 Last Modified Date: 2017-11-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the tapatalk plugin 4.9.0 and earlier and 5.x through 5.2.1 for vbulletin allow remote attackers to execute arbitrary sql commands via a crafted xmlrpc api request to (1) unsubscribe_forum.php or (2) unsubscribe_topic.php in mobiquo/functions/.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-10-26\nLast Modified Date: 2017-11-15", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in default.asp in vu case manager allows remote attackers to execute arbitrary sql commands via the username parameter, a different vector than cve-2007-6143. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-11-29 Last Modified Date: 2011-03-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in default.asp in vu case manager allows remote attackers to execute arbitrary sql commands via the username parameter, a different vector than cve-2007-6143. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-11-29\nLast Modified Date: 2011-03-08", "role": "assistant" } ]
CWE Code: 787 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Out-of-bounds Write Summary: the xgetimage function in x.org libx11 before 1.6.4 might allow remote x servers to gain privileges via vectors involving image type and geometry, which triggers out-of-bounds read operations. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-12-13 Last Modified Date: 2018-09-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Write.", "role": "user" }, { "content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Out-of-bounds Write\nSummary: the xgetimage function in x.org libx11 before 1.6.4 might allow remote x servers to gain privileges via vectors involving image type and geometry, which triggers out-of-bounds read operations.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-12-13\nLast Modified Date: 2018-09-13", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 4.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in misys fusioncapital opics plus allow remote authenticated users to execute arbitrary sql commands via the (1) id or (2) branch parameter. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2016-07-19 Last Modified Date: 2016-11-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 4.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in misys fusioncapital opics plus allow remote authenticated users to execute arbitrary sql commands via the (1) id or (2) branch parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2016-07-19\nLast Modified Date: 2016-11-28", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in login.php in simple customer 1.2 allows remote attackers to execute arbitrary sql commands via the password parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-02-27 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in login.php in simple customer 1.2 allows remote attackers to execute arbitrary sql commands via the password parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-27\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Input Validation Summary: an issue was discovered in certain apple products. ios before 10.1 is affected. macos before 10.12.1 is affected. tvos before 10.0.1 is affected. watchos before 3.1 is affected. the issue involves the "kernel" component. it allows local users to execute arbitrary code in a privileged context or cause a denial of service (mig code mishandling and system crash) via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-02-20 Last Modified Date: 2019-03-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: an issue was discovered in certain apple products. ios before 10.1 is affected. macos before 10.12.1 is affected. tvos before 10.0.1 is affected. watchos before 3.1 is affected. the issue involves the \"kernel\" component. it allows local users to execute arbitrary code in a privileged context or cause a denial of service (mig code mishandling and system crash) via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-02-20\nLast Modified Date: 2019-03-13", "role": "assistant" } ]
CWE Code: 399 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Resource Management Errors Summary: traverser.py in plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote attackers with administrator privileges to cause a denial of service (infinite loop and resource consumption) via unspecified vectors related to "retrieving information for certain resources." Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2014-03-11 Last Modified Date: 2014-03-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Resource Management Errors.", "role": "user" }, { "content": "CWE Code: 399\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Resource Management Errors\nSummary: traverser.py in plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote attackers with administrator privileges to cause a denial of service (infinite loop and resource consumption) via unspecified vectors related to \"retrieving information for certain resources.\"\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2014-03-11\nLast Modified Date: 2014-03-12", "role": "assistant" } ]
CWE Code: 787 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Out-of-bounds Write Summary: in libxaac, there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-118386824 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-09-27 Last Modified Date: 2019-10-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Write.", "role": "user" }, { "content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Out-of-bounds Write\nSummary: in libxaac, there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-118386824\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-01", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the video insight vms 7.3.2.5 and earlier allows remote authenticated attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-09-12 Last Modified Date: 2019-09-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the video insight vms 7.3.2.5 and earlier allows remote authenticated attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-12\nLast Modified Date: 2019-09-13", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Information Exposure Summary: vulnerability in the siebel engineering - installer and deployment component of oracle siebel crm (subcomponent: siebel approval manager). supported versions that are affected are 16.0 and 17.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise siebel engineering - installer and deployment. successful attacks of this vulnerability can result in unauthorized read access to a subset of siebel engineering - installer and deployment accessible data. cvss 3.0 base score 4.3 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:n). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2018-01-18 Last Modified Date: 2018-01-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: vulnerability in the siebel engineering - installer and deployment component of oracle siebel crm (subcomponent: siebel approval manager). supported versions that are affected are 16.0 and 17.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise siebel engineering - installer and deployment. successful attacks of this vulnerability can result in unauthorized read access to a subset of siebel engineering - installer and deployment accessible data. cvss 3.0 base score 4.3 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-01-18\nLast Modified Date: 2018-01-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: thinkcmf x2.2.2 has sql injection via the function _listorders() in adminbasecontroller.class.php and is exploitable with the manager privilege via the listorders[key][1] parameter in a link listorders action. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-12-06 Last Modified Date: 2018-12-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: thinkcmf x2.2.2 has sql injection via the function _listorders() in adminbasecontroller.class.php and is exploitable with the manager privilege via the listorders[key][1] parameter in a link listorders action.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-12-06\nLast Modified Date: 2018-12-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in lightneasy.php in lightneasy 3.2.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the page parameter, a different vector than cve-2008-6593, cve-2010-3484, and cve-2010-3485. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-03-01 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in lightneasy.php in lightneasy 3.2.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the page parameter, a different vector than cve-2008-6593, cve-2010-3484, and cve-2010-3485. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-03-01\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 5.1 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: an issue was discovered in phpmyadmin. a specially crafted database and/or table name can be used to trigger an sql injection attack through the export functionality. all 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected. Access Authentication: NONE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-12-11 Last Modified Date: 2017-07-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.1\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in phpmyadmin. a specially crafted database and/or table name can be used to trigger an sql injection attack through the export functionality. all 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-12-11\nLast Modified Date: 2017-07-01", "role": "assistant" } ]
CWE Code: 276 Vulnerability Type: privilege_escalation CVSS Score: 4.4 CWE Name: Incorrect Default Permissions Summary: in the default privileges of nfc, there is a possible local bypass of user interaction requirements on package installation due to a default permission. this could lead to local escalation of privilege by installing an application with no additional execution privileges needed. user interaction is needed for exploitation.product: androidversions: android-8.0 android-8.1 android-9android id: a-123700348 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-10-11 Last Modified Date: 2019-10-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Default Permissions.", "role": "user" }, { "content": "CWE Code: 276\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Incorrect Default Permissions\nSummary: in the default privileges of nfc, there is a possible local bypass of user interaction requirements on package installation due to a default permission. this could lead to local escalation of privilege by installing an application with no additional execution privileges needed. user interaction is needed for exploitation.product: androidversions: android-8.0 android-8.1 android-9android id: a-123700348\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-10-11\nLast Modified Date: 2019-10-25", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.6 CWE Name: Permissions Privileges and Access Controls Summary: the default configuration in a sudoers file in the red hat openstack-neutron package before 2014.1.2-4, as used in red hat enterprise linux open stack platform 5.0 for red hat enterprise linux 6, allows remote attackers to gain privileges via a crafted configuration file. note: this vulnerability exists because of a cve-2013-6433 regression. Access Authentication: NONE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2014-10-07 Last Modified Date: 2018-10-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: the default configuration in a sudoers file in the red hat openstack-neutron package before 2014.1.2-4, as used in red hat enterprise linux open stack platform 5.0 for red hat enterprise linux 6, allows remote attackers to gain privileges via a crafted configuration file. note: this vulnerability exists because of a cve-2013-6433 regression.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-10-07\nLast Modified Date: 2018-10-22", "role": "assistant" } ]
CWE Code: 362 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Summary: race condition in microsoft malicious software removal tool (msrt) before 5.26 allows local users to gain privileges via a crafted dll, aka "msrt race condition vulnerability." Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-07-20 Last Modified Date: 2017-09-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').", "role": "user" }, { "content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: race condition in microsoft malicious software removal tool (msrt) before 5.26 allows local users to gain privileges via a crafted dll, aka \"msrt race condition vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-07-20\nLast Modified Date: 2017-09-22", "role": "assistant" } ]
CWE Code: 787 Vulnerability Type: privilege_escalation CVSS Score: 4.9 CWE Name: Out-of-bounds Write Summary: comodo antivirus versions 11.0.0.6582 and below are vulnerable to denial of service affecting cmdguard.sys via its filter port "cmdserviceport". a low privileged process can crash cmdvirth.exe to decrease the port's connection count followed by process hollowing a cmdvirth.exe instance with malicious code to obtain a handle to "cmdserviceport". once this occurs, a specially crafted message can be sent to "cmdserviceport" using "filtersendmessage" api. this can trigger an out-of-bounds write if lpoutbuffer parameter in filtersendmessage api is near the end of specified buffer bounds. the crash occurs when the driver performs a memset operation which uses a size beyond the size of buffer specified, causing kernel crash. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2019-07-17 Last Modified Date: 2019-07-23
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Write.", "role": "user" }, { "content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Out-of-bounds Write\nSummary: comodo antivirus versions 11.0.0.6582 and below are vulnerable to denial of service affecting cmdguard.sys via its filter port \"cmdserviceport\". a low privileged process can crash cmdvirth.exe to decrease the port's connection count followed by process hollowing a cmdvirth.exe instance with malicious code to obtain a handle to \"cmdserviceport\". once this occurs, a specially crafted message can be sent to \"cmdserviceport\" using \"filtersendmessage\" api. this can trigger an out-of-bounds write if lpoutbuffer parameter in filtersendmessage api is near the end of specified buffer bounds. the crash occurs when the driver performs a memset operation which uses a size beyond the size of buffer specified, causing kernel crash.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2019-07-17\nLast Modified Date: 2019-07-23", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Improper Access Control Summary: vulnerability in the oracle retail customer management and segmentation foundation component of oracle retail applications (subcomponent: segment). supported versions that are affected are 16.0 and 17.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle retail customer management and segmentation foundation. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle retail customer management and segmentation foundation accessible data as well as unauthorized update, insert or delete access to some of oracle retail customer management and segmentation foundation accessible data and unauthorized ability to cause a partial denial of service (partial dos) of oracle retail customer management and segmentation foundation. cvss 3.0 base score 7.6 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:l/a:l). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-07-23 Last Modified Date: 2019-07-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle retail customer management and segmentation foundation component of oracle retail applications (subcomponent: segment). supported versions that are affected are 16.0 and 17.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle retail customer management and segmentation foundation. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle retail customer management and segmentation foundation accessible data as well as unauthorized update, insert or delete access to some of oracle retail customer management and segmentation foundation accessible data and unauthorized ability to cause a partial denial of service (partial dos) of oracle retail customer management and segmentation foundation. cvss 3.0 base score 7.6 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:l/a:l).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-23\nLast Modified Date: 2019-07-25", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.9 CWE Name: Permissions Privileges and Access Controls Summary: the wrmsr processing functionality in the kvm subsystem in the linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest os users to cause a denial of service (host os crash) by leveraging guest os privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2014-11-10 Last Modified Date: 2017-01-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: the wrmsr processing functionality in the kvm subsystem in the linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest os users to cause a denial of service (host os crash) by leveraging guest os privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2014-11-10\nLast Modified Date: 2017-01-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 5.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: cpanel before 67.9999.103 allows sql injection during eximstats processing (sec-276). Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2019-08-02 Last Modified Date: 2019-08-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: cpanel before 67.9999.103 allows sql injection during eximstats processing (sec-276).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-08-02\nLast Modified Date: 2019-08-12", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: the samsung_extdisp driver in the samsung s4 (gt-i9500) i9500xxuemk8 kernel 3.4 and earlier allows attackers to cause a denial of service (memory corruption) or gain privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-08-24 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the samsung_extdisp driver in the samsung s4 (gt-i9500) i9500xxuemk8 kernel 3.4 and earlier allows attackers to cause a denial of service (memory corruption) or gain privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-08-24\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in profile_view.php in wazzum dating software, possibly 2.0, allows remote attackers to execute arbitrary sql commands via the userid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-01-27 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in profile_view.php in wazzum dating software, possibly 2.0, allows remote attackers to execute arbitrary sql commands via the userid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-01-27\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Permissions Privileges and Access Controls Summary: the lock settings service in android 6.x before 2016-10-01 and 7.0 before 2016-10-01 allows attackers to remove a device's pin or password, and consequently gain privileges, via a crafted application, aka internal bug 30003944. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2016-10-10 Last Modified Date: 2016-11-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: the lock settings service in android 6.x before 2016-10-01 and 7.0 before 2016-10-01 allows attackers to remove a device's pin or password, and consequently gain privileges, via a crafted application, aka internal bug 30003944.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2016-10-10\nLast Modified Date: 2016-11-28", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Improper Access Control Summary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized read access to a subset of oracle vm virtualbox accessible data. cvss 3.0 base score 3.8 (confidentiality impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:l/i:n/a:n). Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-01-16 Last Modified Date: 2019-06-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized read access to a subset of oracle vm virtualbox accessible data. cvss 3.0 base score 3.8 (confidentiality impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:l/i:n/a:n).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-01-16\nLast Modified Date: 2019-06-11", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: sql_injection CVSS Score: 5.0 CWE Name: Information Exposure Summary: filter.php in phpfootball 1.6 and earlier allows remote attackers to retrieve password hashes via a request with an accounts value for the dbtable parameter, in conjunction with a password value for the dbfield parameter. note: this has been reported as a sql injection vulnerability by some sources, but the provenance of that information is unknown. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2009-02-23 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Information Exposure\nSummary: filter.php in phpfootball 1.6 and earlier allows remote attackers to retrieve password hashes via a request with an accounts value for the dbtable parameter, in conjunction with a password value for the dbfield parameter. note: this has been reported as a sql injection vulnerability by some sources, but the provenance of that information is unknown.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2009-02-23\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in evb/check_url.php in pligg cms 9.9.5 beta allows remote attackers to execute arbitrary sql commands via the url parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-12-26 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in evb/check_url.php in pligg cms 9.9.5 beta allows remote attackers to execute arbitrary sql commands via the url parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-26\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in downlot.php in lokomedia cms 1.4.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the file parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-05-24 Last Modified Date: 2010-05-24
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in downlot.php in lokomedia cms 1.4.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the file parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-05-24\nLast Modified Date: 2010-05-24", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: multiple stack-based buffer overflows in command exec in cisco ios allow local users to gain privileges via unspecified vectors, aka (1) psirt-0474975756 and (2) psirt-0388256465. note: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. however, since it is from a well-known researcher, it is being assigned a cve identifier for tracking purposes. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2007-10-18 Last Modified Date: 2008-11-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: multiple stack-based buffer overflows in command exec in cisco ios allow local users to gain privileges via unspecified vectors, aka (1) psirt-0474975756 and (2) psirt-0388256465. note: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. however, since it is from a well-known researcher, it is being assigned a cve identifier for tracking purposes.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2007-10-18\nLast Modified Date: 2008-11-15", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in news.php4 in hypermethod elearning server 4g allows remote attackers to execute arbitrary sql commands via the nid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2012-05-21 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in news.php4 in hypermethod elearning server 4g allows remote attackers to execute arbitrary sql commands via the nid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-05-21\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Permissions Privileges and Access Controls Summary: an elevation of privilege vulnerability in the qualcomm bus driver in android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. android id: a-30311977. references: qualcomm qc-cr#1050455. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-11-25 Last Modified Date: 2016-11-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability in the qualcomm bus driver in android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. android id: a-30311977. references: qualcomm qc-cr#1050455.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-11-25\nLast Modified Date: 2016-11-28", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 9.0 CWE Name: Permissions Privileges and Access Controls Summary: the cisco rvs4000 4-port gigabit security router before 1.3.2.0, pvc2300 business internet video camera before 1.1.2.6, wvc200 wireless-g ptz internet video camera before 1.1.1.15, wvc210 wireless-g ptz internet video camera before 1.1.1.15, and wvc2300 wireless-g business internet video camera before 1.1.2.6 do not properly restrict read access to passwords, which allows context-dependent attackers to obtain sensitive information, related to (1) access by remote authenticated users to a pvc2300 or wvc2300 via a crafted url, (2) leveraging setup privileges on a wvc200 or wvc210, and (3) leveraging administrative privileges on an rvs4000, aka bug id cscte64726. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2010-04-22 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: the cisco rvs4000 4-port gigabit security router before 1.3.2.0, pvc2300 business internet video camera before 1.1.2.6, wvc200 wireless-g ptz internet video camera before 1.1.1.15, wvc210 wireless-g ptz internet video camera before 1.1.1.15, and wvc2300 wireless-g business internet video camera before 1.1.2.6 do not properly restrict read access to passwords, which allows context-dependent attackers to obtain sensitive information, related to (1) access by remote authenticated users to a pvc2300 or wvc2300 via a crafted url, (2) leveraging setup privileges on a wvc200 or wvc210, and (3) leveraging administrative privileges on an rvs4000, aka bug id cscte64726.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-04-22\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Improper Input Validation Summary: base_sock_create in drivers/isdn/misdn/socket.c in the af_isdn network module in the linux kernel through 5.3.2 does not enforce cap_net_raw, which means that unprivileged users can create a raw socket, aka cid-b91ee4aa2a21. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2019-10-01 Last Modified Date: 2019-10-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Input Validation\nSummary: base_sock_create in drivers/isdn/misdn/socket.c in the af_isdn network module in the linux kernel through 5.3.2 does not enforce cap_net_raw, which means that unprivileged users can create a raw socket, aka cid-b91ee4aa2a21.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-10-01\nLast Modified Date: 2019-10-25", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in the newsletter module 1.0 for kwsphp, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the newsletter parameter. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-10-14 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the newsletter module 1.0 for kwsphp, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the newsletter parameter.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-10-14\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.6 CWE Name: Permissions Privileges and Access Controls Summary: an elevation of privilege vulnerability in the qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-32450563. references: qc-cr#880388. Access Authentication: NONE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-01-12 Last Modified Date: 2017-01-18
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability in the qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-32450563. references: qc-cr#880388.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-01-18", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 5.0 CWE Name: Permissions Privileges and Access Controls Summary: ibm filenet p8 content engine (aka p8ce) 4.0.1 through 5.0.0, as used in filenet p8 content manager (cm) and filenet p8 business process manager (bpm), does not require the privileged_write access role for all intended object store modifications, which allows remote attackers to change a privileged property of an object via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2011-02-21 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: ibm filenet p8 content engine (aka p8ce) 4.0.1 through 5.0.0, as used in filenet p8 content manager (cm) and filenet p8 business process manager (bpm), does not require the privileged_write access role for all intended object store modifications, which allows remote attackers to change a privileged property of an object via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2011-02-21\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in globepersonnel_login.asp in logoshows bbs 2.0 allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-05-11 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in globepersonnel_login.asp in logoshows bbs 2.0 allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-05-11\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: the kernel in apple os x before 10.11.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-03-24 Last Modified Date: 2016-12-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the kernel in apple os x before 10.11.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-03-24\nLast Modified Date: 2016-12-03", "role": "assistant" } ]
CWE Code: 863 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Incorrect Authorization Summary: a vulnerability in the web-based management interface of cisco enterprise nfv infrastructure software (nfvis) could allow an authenticated, remote attacker to cause an affected system to reboot or shut down. the vulnerability is due to insufficient server-side authorization checks. an attacker who is logged in to the web-based management interface as a low-privileged user could exploit this vulnerability by sending a crafted http request. a successful exploit could allow the attacker to use the low-privileged user account to reboot or shut down the affected system. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2018-10-05 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Authorization.", "role": "user" }, { "content": "CWE Code: 863\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Incorrect Authorization\nSummary: a vulnerability in the web-based management interface of cisco enterprise nfv infrastructure software (nfvis) could allow an authenticated, remote attacker to cause an affected system to reboot or shut down. the vulnerability is due to insufficient server-side authorization checks. an attacker who is logged in to the web-based management interface as a low-privileged user could exploit this vulnerability by sending a crafted http request. a successful exploit could allow the attacker to use the low-privileged user account to reboot or shut down the affected system.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2018-10-05\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 787 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Out-of-bounds Write Summary: in impeg2_idct_recon_sse42() of impeg2_idct_recon_sse42_intr.c, there is an out of bound write due to a missing bounds check. this could lead to an remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. android id: a-70349612. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-04-04 Last Modified Date: 2018-05-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Write.", "role": "user" }, { "content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Out-of-bounds Write\nSummary: in impeg2_idct_recon_sse42() of impeg2_idct_recon_sse42_intr.c, there is an out of bound write due to a missing bounds check. this could lead to an remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. android id: a-70349612.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-04-04\nLast Modified Date: 2018-05-09", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Permissions Privileges and Access Controls Summary: microsoft internet explorer 10 and 11 allows remote attackers to gain privileges via a crafted web site, aka "internet explorer elevation of privilege vulnerability," a different vulnerability than cve-2014-6349. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2014-11-11 Last Modified Date: 2018-10-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: microsoft internet explorer 10 and 11 allows remote attackers to gain privileges via a crafted web site, aka \"internet explorer elevation of privilege vulnerability,\" a different vulnerability than cve-2014-6349.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2014-11-11\nLast Modified Date: 2018-10-12", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: the _rtld function in the run-time link-editor (rtld) in libexec/rtld-elf/rtld.c in freebsd 7.1 and 8.0 does not clear the (1) ld_libmap, (2) ld_library_path, (3) ld_libmap_disable, (4) ld_debug, and (5) ld_elf_hints_path environment variables, which allows local users to gain privileges by executing a setuid or setguid program with a modified variable containing an untrusted search path that points to a trojan horse library, different vectors than cve-2009-4146. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2009-12-02 Last Modified Date: 2019-05-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the _rtld function in the run-time link-editor (rtld) in libexec/rtld-elf/rtld.c in freebsd 7.1 and 8.0 does not clear the (1) ld_libmap, (2) ld_library_path, (3) ld_libmap_disable, (4) ld_debug, and (5) ld_elf_hints_path environment variables, which allows local users to gain privileges by executing a setuid or setguid program with a modified variable containing an untrusted search path that points to a trojan horse library, different vectors than cve-2009-4146.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2009-12-02\nLast Modified Date: 2019-05-22", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: pyraw in zenoss 2.5.3 allows local privilege escalation by modifying environment variables to redirect execution before privileges are dropped, aka zen-31765. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-08-21 Last Modified Date: 2019-08-27
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: pyraw in zenoss 2.5.3 allows local privilege escalation by modifying environment variables to redirect execution before privileges are dropped, aka zen-31765.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-08-21\nLast Modified Date: 2019-08-27", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 6.3 CWE Name: Improper Input Validation Summary: a denial of service vulnerability exists when microsoft hyper-v network switch running on a windows 10, windows server 2008 r2, windows 8.1, windows server 2012 r2, or windows server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "hyper-v denial of service vulnerability." this cve id is unique from cve-2017-0178, cve-2017-0179, cve-2017-0182, cve-2017-0184, cve-2017-0185, and cve-2017-0186. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2017-04-12 Last Modified Date: 2017-04-18
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.3\nCWE Name: Improper Input Validation\nSummary: a denial of service vulnerability exists when microsoft hyper-v network switch running on a windows 10, windows server 2008 r2, windows 8.1, windows server 2012 r2, or windows server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka \"hyper-v denial of service vulnerability.\" this cve id is unique from cve-2017-0178, cve-2017-0179, cve-2017-0182, cve-2017-0184, cve-2017-0185, and cve-2017-0186.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2017-04-12\nLast Modified Date: 2017-04-18", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: google chrome prior to 56.0.2924.76 for linux, windows and mac, and 56.0.2924.87 for android, had an insufficiently strict content security policy on the chrome app launcher page, which allowed a remote attacker to inject scripts or html into a privileged page via a crafted html page. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2017-02-17 Last Modified Date: 2018-01-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: google chrome prior to 56.0.2924.76 for linux, windows and mac, and 56.0.2924.87 for android, had an insufficiently strict content security policy on the chrome app launcher page, which allowed a remote attacker to inject scripts or html into a privileged page via a crafted html page.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2017-02-17\nLast Modified Date: 2018-01-05", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Input Validation Summary: an elevation of privilege vulnerability exists in windows text service framework (tsf) when the tsf server process does not validate the source of input or commands it receives, aka 'windows text service framework elevation of privilege vulnerability'. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-09-11 Last Modified Date: 2019-09-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: an elevation of privilege vulnerability exists in windows text service framework (tsf) when the tsf server process does not validate the source of input or commands it receives, aka 'windows text service framework elevation of privilege vulnerability'.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-09-11\nLast Modified Date: 2019-09-12", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in redir_last_post_list.php in softbb 0.1.3 allows remote attackers to execute arbitrary sql commands via the post parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2015-01-15 Last Modified Date: 2015-01-16
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in redir_last_post_list.php in softbb 0.1.3 allows remote attackers to execute arbitrary sql commands via the post parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-01-15\nLast Modified Date: 2015-01-16", "role": "assistant" } ]
CWE Code: 326 Vulnerability Type: privilege_escalation CVSS Score: 5.0 CWE Name: Inadequate Encryption Strength Summary: weak cryptography used for passwords in ca privileged access manager 2.x reduces the complexity for password cracking. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2018-06-18 Last Modified Date: 2018-08-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Inadequate Encryption Strength.", "role": "user" }, { "content": "CWE Code: 326\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Inadequate Encryption Strength\nSummary: weak cryptography used for passwords in ca privileged access manager 2.x reduces the complexity for password cracking.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-06-18\nLast Modified Date: 2018-08-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in vivaprograms infinity script 2.x.x, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the username field. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-09-16 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in vivaprograms infinity script 2.x.x, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the username field.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-09-16\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in core/showsite.php in chillycms 1.1.3 allows remote attackers to execute arbitrary sql commands via the name parameter. note: some of these details are obtained from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-10-08 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in core/showsite.php in chillycms 1.1.3 allows remote attackers to execute arbitrary sql commands via the name parameter. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-10-08\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 77 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection') Summary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability. mds 9000 series multilayer switches are affected running software versions prior to 6.2(27) and 8.2(3). nexus 3000 series switches are affected running software versions prior to 7.0(3)i4(9) and 7.0(3)i7(6). nexus 3500 platform switches are affected running software versions prior to 6.0(2)a8(11) and 7.0(3)i7(6). nexus 3600 platform switches are affected running software versions prior to 7.0(3)f3(5). nexus 9000 series switches in standalone nx-os mode are affected running software versions prior to 7.0(3)i4(9), 7.0(3)i7(6). nexus 9500 r-series line cards and fabric modules are affected running software versions prior to 7.0(3)f3(5). nexus 7000 and 7700 series switches are affected running software versions prior to 6.2(22) and 8.2(3). Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-03-11 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in a Command ('Command Injection').", "role": "user" }, { "content": "CWE Code: 77\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')\nSummary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. the vulnerability is due to insufficient validation of arguments passed to certain cli commands. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability. mds 9000 series multilayer switches are affected running software versions prior to 6.2(27) and 8.2(3). nexus 3000 series switches are affected running software versions prior to 7.0(3)i4(9) and 7.0(3)i7(6). nexus 3500 platform switches are affected running software versions prior to 6.0(2)a8(11) and 7.0(3)i7(6). nexus 3600 platform switches are affected running software versions prior to 7.0(3)f3(5). nexus 9000 series switches in standalone nx-os mode are affected running software versions prior to 7.0(3)i4(9), 7.0(3)i7(6). nexus 9500 r-series line cards and fabric modules are affected running software versions prior to 7.0(3)f3(5). nexus 7000 and 7700 series switches are affected running software versions prior to 6.2(22) and 8.2(3).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-03-11\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the check_banlist function in includes/sessions.php in enano cms 1.1.7pl1; 1.0.6pl2; and possibly other versions before 1.1.8, 1.0.6pl3, and 1.1.7pl2 allows remote attackers to execute arbitrary sql commands via the email parameter to index.php. note: some of these details are obtained from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-04-07 Last Modified Date: 2011-09-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the check_banlist function in includes/sessions.php in enano cms 1.1.7pl1; 1.0.6pl2; and possibly other versions before 1.1.8, 1.0.6pl3, and 1.1.7pl2 allows remote attackers to execute arbitrary sql commands via the email parameter to index.php. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-04-07\nLast Modified Date: 2011-09-22", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in ibm maximo asset management 7.1 through 7.5, as used in smartcloud control desk, tivoli asset management for it, tivoli service request manager, maximo service desk, and change and configuration management database (ccmdb), allows remote authenticated users to execute arbitrary sql commands via unspecified vectors. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2012-09-10 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in ibm maximo asset management 7.1 through 7.5, as used in smartcloud control desk, tivoli asset management for it, tivoli service request manager, maximo service desk, and change and configuration management database (ccmdb), allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-09-10\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in login.asp in datacheck solutions forumpal fe 1.1 and forumpal 1.5 allows remote attackers to execute arbitrary sql commands via the (1) password parameter in 1.1 and (2) p_password parameter in 1.5. note: some of these details are obtained from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-07-08 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in login.asp in datacheck solutions forumpal fe 1.1 and forumpal 1.5 allows remote attackers to execute arbitrary sql commands via the (1) password parameter in 1.1 and (2) p_password parameter in 1.5. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-07-08\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the focusplus developments survey manager (com_surveymanager) component 1.5.0 for joomla! allows remote attackers to execute arbitrary sql commands via the stype parameter in an editsurvey action to index.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-09-23 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the focusplus developments survey manager (com_surveymanager) component 1.5.0 for joomla! allows remote attackers to execute arbitrary sql commands via the stype parameter in an editsurvey action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-09-23\nLast Modified Date: 2017-09-19", "role": "assistant" } ]