text
stringlengths 365
3.97k
| conversations
listlengths 3
3
|
---|---|
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: apps/gsudo.c in gsudo in toaruos through 1.10.9 has a buffer overflow allowing local privilege escalation to the root user via the display environment variable.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-06-23
Last Modified Date: 2019-06-24 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: apps/gsudo.c in gsudo in toaruos through 1.10.9 has a buffer overflow allowing local privilege escalation to the root user via the display environment variable.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-23\nLast Modified Date: 2019-06-24",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in cybozu garoon before 4.2.2.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-04-20
Last Modified Date: 2017-04-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in cybozu garoon before 4.2.2.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-04-20\nLast Modified Date: 2017-04-25",
"role": "assistant"
}
] |
CWE Code: 434
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Unrestricted Upload of File with Dangerous Type
Summary: an issue was discovered on wifi-soft unibox controller 0.x through 2.x devices. network/mesh/edit-nds.php is vulnerable to arbitrary file upload, allowing an attacker to upload .php files and execute code on the server with root user privileges. authentication for accessing this component can be bypassed by using hard coded credentials.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-03-21
Last Modified Date: 2019-03-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Unrestricted Upload of File with Dangerous Type.",
"role": "user"
},
{
"content": "CWE Code: 434\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Unrestricted Upload of File with Dangerous Type\nSummary: an issue was discovered on wifi-soft unibox controller 0.x through 2.x devices. network/mesh/edit-nds.php is vulnerable to arbitrary file upload, allowing an attacker to upload .php files and execute code on the server with root user privileges. authentication for accessing this component can be bypassed by using hard coded credentials.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-03-21\nLast Modified Date: 2019-03-26",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Permissions Privileges and Access Controls
Summary: ibm security siteprotector system 3.0, 3.1, and 3.1.1 allows local users to gain privileges.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-09-20
Last Modified Date: 2017-09-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: ibm security siteprotector system 3.0, 3.1, and 3.1.1 allows local users to gain privileges.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-09-20\nLast Modified Date: 2017-09-27",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: ** disputed ** multiple sql injection vulnerabilities in infinicart allow remote attackers to execute arbitrary sql commands via the (1) groupid parameter in (a) browse_group.asp, (2) productid parameter in (b) added_to_cart.asp, and (3) catid and (4) subid parameter in (c) browsesubcat.asp. note: the vendor has disputed this report, saying "the vulnerabilities mentioned were never present in our official released products but only in the unofficial demo version. however we do appreciate the information. we have update our demo version and made sure all those vulnerabilities are fixed."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2006-11-17
Last Modified Date: 2018-10-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: ** disputed ** multiple sql injection vulnerabilities in infinicart allow remote attackers to execute arbitrary sql commands via the (1) groupid parameter in (a) browse_group.asp, (2) productid parameter in (b) added_to_cart.asp, and (3) catid and (4) subid parameter in (c) browsesubcat.asp. note: the vendor has disputed this report, saying \"the vulnerabilities mentioned were never present in our official released products but only in the unofficial demo version. however we do appreciate the information. we have update our demo version and made sure all those vulnerabilities are fixed.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2006-11-17\nLast Modified Date: 2018-10-17",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Improper Privilege Management
Summary: an elevation of privilege vulnerability exists in the way that the unistore.dll handles objects in memory, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1215, cve-2019-1253, cve-2019-1303.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-09-11
Last Modified Date: 2019-09-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Privilege Management\nSummary: an elevation of privilege vulnerability exists in the way that the unistore.dll handles objects in memory, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1215, cve-2019-1253, cve-2019-1303.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-11\nLast Modified Date: 2019-09-12",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Input Validation
Summary: the printerlogic print management software, versions up to and including 18.3.1.96, does not sanitize special characters allowing for remote unauthorized changes to configuration files. an unauthenticated attacker may be able to remotely execute arbitrary code with system privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-05-08
Last Modified Date: 2019-05-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Input Validation\nSummary: the printerlogic print management software, versions up to and including 18.3.1.96, does not sanitize special characters allowing for remote unauthorized changes to configuration files. an unauthenticated attacker may be able to remotely execute arbitrary code with system privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-05-08\nLast Modified Date: 2019-05-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in the sondages module in kwsphp 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter in a results action, a different module than cve-2007-4956.2.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-09-19
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the sondages module in kwsphp 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter in a results action, a different module than cve-2007-4956.2.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-09-19\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 78
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary: on d-link dir-550a and dir-604m devices through v2.10kr, a malicious user can forge an http request to inject operating system commands that can be executed on the device with higher privileges, aka remote code execution.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-05-18
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: on d-link dir-550a and dir-604m devices through v2.10kr, a malicious user can forge an http request to inject operating system commands that can be executed on the device with higher privileges, aka remote code execution.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-05-18\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 78
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary: an exploitable command injection vulnerability exists in the web server functionality of moxa edr-810 v4.1 build 17030317. a specially crafted http post can cause a privilege escalation resulting in root shell. an attacker can inject os commands into the rsakey\_name= parm in the "/goform/webrsakeygen" uri to trigger this vulnerability.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-05-14
Last Modified Date: 2018-06-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: an exploitable command injection vulnerability exists in the web server functionality of moxa edr-810 v4.1 build 17030317. a specially crafted http post can cause a privilege escalation resulting in root shell. an attacker can inject os commands into the rsakey\\_name= parm in the \"/goform/webrsakeygen\" uri to trigger this vulnerability.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-05-14\nLast Modified Date: 2018-06-15",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an unprivileged user can craft a bitstream such that the payload encoded in the bitstream gains code execution in snapdragon auto, snapdragon compute, snapdragon connectivity, snapdragon consumer iot, snapdragon industrial iot, snapdragon mobile, snapdragon voice & music, snapdragon wearables in mdm9650, msm8909w, msm8996au, qcs605, qualcomm 215, sd 210/sd 212/sd 205, sd 425, sd 427, sd 430, sd 435, sd 439 / sd 429, sd 450, sd 625, sd 632, sd 636, sd 675, sd 712 / sd 710 / sd 670, sd 820, sd 820a, sd 835, sd 845 / sd 850, sd 855, sd 8cx, sda660, sdm439, sdm630, sdm660, snapdragon_high_med_2016, sxr1130
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-06-14
Last Modified Date: 2019-06-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an unprivileged user can craft a bitstream such that the payload encoded in the bitstream gains code execution in snapdragon auto, snapdragon compute, snapdragon connectivity, snapdragon consumer iot, snapdragon industrial iot, snapdragon mobile, snapdragon voice & music, snapdragon wearables in mdm9650, msm8909w, msm8996au, qcs605, qualcomm 215, sd 210/sd 212/sd 205, sd 425, sd 427, sd 430, sd 435, sd 439 / sd 429, sd 450, sd 625, sd 632, sd 636, sd 675, sd 712 / sd 710 / sd 670, sd 820, sd 820a, sd 835, sd 845 / sd 850, sd 855, sd 8cx, sda660, sdm439, sdm630, sdm660, snapdragon_high_med_2016, sxr1130\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-14\nLast Modified Date: 2019-06-17",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 5.5
CWE Name: Improper Input Validation
Summary: an arbitrary file deletion vulnerability exists in magento 2.2 prior to 2.2.10, magento 2.3 prior to 2.3.3 or 2.3.2-p1. an authenticated user with export data transfer privileges can craft a request to perform arbitrary file deletion.
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-05
Last Modified Date: 2019-11-06 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Input Validation\nSummary: an arbitrary file deletion vulnerability exists in magento 2.2 prior to 2.2.10, magento 2.3 prior to 2.3.3 or 2.3.2-p1. an authenticated user with export data transfer privileges can craft a request to perform arbitrary file deletion.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-05\nLast Modified Date: 2019-11-06",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 3.7
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: race condition in daemon/slave.c in gdm before 2.14.1 allows local users to gain privileges via a symlink attack when gdm performs chown and chgrp operations on the .iceauthority file.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2006-04-25
Last Modified Date: 2018-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 3.7\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: race condition in daemon/slave.c in gdm before 2.14.1 allows local users to gain privileges via a symlink attack when gdm performs chown and chgrp operations on the .iceauthority file.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2006-04-25\nLast Modified Date: 2018-10-03",
"role": "assistant"
}
] |
CWE Code: 77
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary: dell emc recoverpoint versions prior to 5.1.2 and recoverpoint for vms versions prior to 5.1.1.3, contains a command injection vulnerability in the boxmgmt cli. an authenticated malicious user with boxmgmt privileges may potentially exploit this vulnerability to read rpa files. note that files that require root permission cannot be read.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2018-05-29
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in a Command ('Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 77\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')\nSummary: dell emc recoverpoint versions prior to 5.1.2 and recoverpoint for vms versions prior to 5.1.1.3, contains a command injection vulnerability in the boxmgmt cli. an authenticated malicious user with boxmgmt privileges may potentially exploit this vulnerability to read rpa files. note that files that require root permission cannot be read.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-05-29\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Improper Input Validation
Summary: in bluetooth, there is possible controlled termination due to a missing bounds check. this could lead to remote denial of service with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-115747410
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-09-27
Last Modified Date: 2019-09-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Improper Input Validation\nSummary: in bluetooth, there is possible controlled termination due to a missing bounds check. this could lead to remote denial of service with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-115747410\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the search feature in e107 0.7.16 and earlier allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-11-29
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the search feature in e107 0.7.16 and earlier allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-11-29\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: cross-site scripting (xss) vulnerability in admin/search.asp in xigla poll manager xe allows remote authenticated users with administrator role privileges to inject arbitrary web script or html via unspecified vectors ("all fields").
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2008-06-18
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: cross-site scripting (xss) vulnerability in admin/search.asp in xigla poll manager xe allows remote authenticated users with administrator role privileges to inject arbitrary web script or html via unspecified vectors (\"all fields\").\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2008-06-18\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 5.1
CWE Name: Permissions Privileges and Access Controls
Summary: netapp altavault 4.1 and earlier allows man-in-the-middle attackers to obtain sensitive information, gain privileges, or cause a denial of service via vectors related to the smb protocol.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-07-03
Last Modified Date: 2017-07-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 5.1\nCWE Name: Permissions Privileges and Access Controls\nSummary: netapp altavault 4.1 and earlier allows man-in-the-middle attackers to obtain sensitive information, gain privileges, or cause a denial of service via vectors related to the smb protocol.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-07-03\nLast Modified Date: 2017-07-05",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 5.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: multiple vulnerabilities in cisco spa100 series analog telephone adapters (atas) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. the vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. an attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. a successful exploit could allow the attacker to execute arbitrary code with elevated privileges. note: the web-based management interface is enabled by default.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-10-16
Last Modified Date: 2019-10-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 5.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: multiple vulnerabilities in cisco spa100 series analog telephone adapters (atas) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. the vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. an attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. a successful exploit could allow the attacker to execute arbitrary code with elevated privileges. note: the web-based management interface is enabled by default.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-10-16\nLast Modified Date: 2019-10-18",
"role": "assistant"
}
] |
CWE Code: 287
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Authentication
Summary: if rsh service is enabled on junos os and if the pam authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. rsh service is disabled by default on junos. there is no documented cli command to enable this service. however, an undocumented cli command allows a privileged junos user to enable rsh service and disable pam, and hence expose the system to unauthenticated root access. when rsh is enabled, the device is listing to rsh connections on port 514. this issue is not exploitable on platforms where junos release is based on freebsd 10+. affected releases are juniper networks junos os: 12.1x46 versions prior to 12.1x46-d77 on srx series; 12.3 versions prior to 12.3r12-s10; 12.3x48 versions prior to 12.3x48-d75 on srx series; 14.1x53 versions prior to 14.1x53-d47 on qfx/ex series; 15.1 versions prior to 15.1r4-s9, 15.1r6-s6, 15.1r7; 15.1x49 versions prior to 15.1x49-d131, 15.1x49-d140 on srx series; 15.1x53 versions prior to 15.1x53-d59 on ex2300/ex3400 series; 15.1x53 versions prior to 15.1x53-d67 on qfx10k series; 15.1x53 versions prior to 15.1x53-d233 on qfx5200/qfx5110 series; 15.1x53 versions prior to 15.1x53-d471, 15.1x53-d490 on nfx series; 16.1 versions prior to 16.1r3-s9, 16.1r4-s9, 16.1r5-s4, 16.1r6-s4, 16.1r7; 16.2 versions prior to 16.2r2-s5; 17.1 versions prior to 17.1r1-s7, 17.1r2-s7, 17.1r3; 17.2 versions prior to 17.2r1-s6, 17.2r2-s4, 17.2r3; 17.2x75 versions prior to 17.2x75-d110, 17.2x75-d91; 17.3 versions prior to 17.3r1-s4, 17.3r2-s2, 17.3r3; 17.4 versions prior to 17.4r1-s3, 17.4r2; 18.2x75 versions prior to 18.2x75-d5.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-10-10
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Authentication.",
"role": "user"
},
{
"content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Authentication\nSummary: if rsh service is enabled on junos os and if the pam authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. rsh service is disabled by default on junos. there is no documented cli command to enable this service. however, an undocumented cli command allows a privileged junos user to enable rsh service and disable pam, and hence expose the system to unauthenticated root access. when rsh is enabled, the device is listing to rsh connections on port 514. this issue is not exploitable on platforms where junos release is based on freebsd 10+. affected releases are juniper networks junos os: 12.1x46 versions prior to 12.1x46-d77 on srx series; 12.3 versions prior to 12.3r12-s10; 12.3x48 versions prior to 12.3x48-d75 on srx series; 14.1x53 versions prior to 14.1x53-d47 on qfx/ex series; 15.1 versions prior to 15.1r4-s9, 15.1r6-s6, 15.1r7; 15.1x49 versions prior to 15.1x49-d131, 15.1x49-d140 on srx series; 15.1x53 versions prior to 15.1x53-d59 on ex2300/ex3400 series; 15.1x53 versions prior to 15.1x53-d67 on qfx10k series; 15.1x53 versions prior to 15.1x53-d233 on qfx5200/qfx5110 series; 15.1x53 versions prior to 15.1x53-d471, 15.1x53-d490 on nfx series; 16.1 versions prior to 16.1r3-s9, 16.1r4-s9, 16.1r5-s4, 16.1r6-s4, 16.1r7; 16.2 versions prior to 16.2r2-s5; 17.1 versions prior to 17.1r1-s7, 17.1r2-s7, 17.1r3; 17.2 versions prior to 17.2r1-s6, 17.2r2-s4, 17.2r3; 17.2x75 versions prior to 17.2x75-d110, 17.2x75-d91; 17.3 versions prior to 17.3r1-s4, 17.3r2-s2, 17.3r3; 17.4 versions prior to 17.4r1-s3, 17.4r2; 18.2x75 versions prior to 18.2x75-d5.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-10-10\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in ecomat cms 5.0 allows remote attackers to execute arbitrary sql commands via the show parameter in a web action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-11-02
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in ecomat cms 5.0 allows remote attackers to execute arbitrary sql commands via the show parameter in a web action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-02\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 77
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary: prima systems flexair, versions 2.3.38 and prior. improper validation of file extensions when uploading files could allow a remote authenticated attacker to upload and execute malicious applications within the application?s web root with root privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-07-01
Last Modified Date: 2019-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in a Command ('Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 77\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')\nSummary: prima systems flexair, versions 2.3.38 and prior. improper validation of file extensions when uploading files could allow a remote authenticated attacker to upload and execute malicious applications within the application?s web root with root privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-07-01\nLast Modified Date: 2019-10-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: fs expedia clone 1.0 has sql injection via the pages.php or content.php id parameter, or the show-flight-result.php fl_orig or fl_dest parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-13
Last Modified Date: 2017-12-20 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: fs expedia clone 1.0 has sql injection via the pages.php or content.php id parameter, or the show-flight-result.php fl_orig or fl_dest parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-13\nLast Modified Date: 2017-12-20",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the pie-register plugin before 3.1.2 for wordpress has sql injection, a different issue than cve-2018-10969.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-08-27
Last Modified Date: 2019-08-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the pie-register plugin before 3.1.2 for wordpress has sql injection, a different issue than cve-2018-10969.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-27\nLast Modified Date: 2019-08-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in codewidgets.com online event registration template allow remote attackers to execute arbitrary sql commands via the (1) email address and (2) password fields in (a) login.asp and (b) admin_login.asp.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-10-29
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in codewidgets.com online event registration template allow remote attackers to execute arbitrary sql commands via the (1) email address and (2) password fields in (a) login.asp and (b) admin_login.asp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-10-29\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 400
Vulnerability Type: privilege_escalation
CVSS Score: 4.9
CWE Name: Uncontrolled Resource Consumption
Summary: memory leak in hw/9pfs/9p-handle.c in qemu (aka quick emulator) allows local privileged guest os users to cause a denial of service (host memory consumption and possibly qemu process crash) by leveraging a missing cleanup operation in the handle backend.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2016-12-29
Last Modified Date: 2018-09-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Uncontrolled Resource Consumption.",
"role": "user"
},
{
"content": "CWE Code: 400\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Uncontrolled Resource Consumption\nSummary: memory leak in hw/9pfs/9p-handle.c in qemu (aka quick emulator) allows local privileged guest os users to cause a denial of service (host memory consumption and possibly qemu process crash) by leveraging a missing cleanup operation in the handle backend.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2016-12-29\nLast Modified Date: 2018-09-07",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in arrayos before ag 9.4.0.135, when the portal bookmark function is enabled, allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-05-05
Last Modified Date: 2017-05-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in arrayos before ag 9.4.0.135, when the portal bookmark function is enabled, allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-05-05\nLast Modified Date: 2017-05-17",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: the qualcomm trustzone component in android before 2016-05-01 on nexus 5, nexus 6, nexus 7 (2013), and android one devices allows attackers to gain privileges via a crafted application, aka internal bug 24968809.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-05-09
Last Modified Date: 2017-09-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: the qualcomm trustzone component in android before 2016-05-01 on nexus 5, nexus 6, nexus 7 (2013), and android one devices allows attackers to gain privileges via a crafted application, aka internal bug 24968809.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-05-09\nLast Modified Date: 2017-09-02",
"role": "assistant"
}
] |
CWE Code: 399
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Resource Management Errors
Summary: use-after-free vulnerability in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 gold, sp2, r2, and r2 sp1, and windows 7 gold and sp1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other cves listed in ms11-054, aka "win32k use after free vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2011-07-13
Last Modified Date: 2019-02-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Resource Management Errors.",
"role": "user"
},
{
"content": "CWE Code: 399\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Resource Management Errors\nSummary: use-after-free vulnerability in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 gold, sp2, r2, and r2 sp1, and windows 7 gold and sp1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other cves listed in ms11-054, aka \"win32k use after free vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2011-07-13\nLast Modified Date: 2019-02-26",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 8.5
CWE Name: Permissions Privileges and Access Controls
Summary: emc documentum d2 3.1 before p24, 3.1sp1 before p02, 4.0 before p11, 4.1 before p16, and 4.2 before p05 does not properly restrict tickets provided by d2getadminticketmethod and d2refreshcachemethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-08-20
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 8.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: emc documentum d2 3.1 before p24, 3.1sp1 before p02, 4.0 before p11, 4.1 before p16, and 4.2 before p05 does not properly restrict tickets provided by d2getadminticketmethod and d2refreshcachemethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-08-20\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the sudoers file in the linux system configuration in f5 firepass 6.0.0 through 6.1.0 and 7.0.0 does not require a password for executing commands as root, which allows local users to gain privileges via the sudo program, as demonstrated by the user account that executes php scripts, a different vulnerability than cve-2012-1777.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2012-04-05
Last Modified Date: 2017-12-20 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the sudoers file in the linux system configuration in f5 firepass 6.0.0 through 6.1.0 and 7.0.0 does not require a password for executing commands as root, which allows local users to gain privileges via the sudo program, as demonstrated by the user account that executes php scripts, a different vulnerability than cve-2012-1777.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-04-05\nLast Modified Date: 2017-12-20",
"role": "assistant"
}
] |
CWE Code: 312
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Cleartext Storage of Sensitive Information
Summary: amazon aws sdk <=2.8.5 for android uses android sharedpreferences to store plain text aws sts temporary credentials retrieved by aws cognito identity service. an attacker can use these credentials to create authenticated and/or authorized requests. note that the attacker must have "root" privilege access to the android filesystem in order to exploit this vulnerability (i.e. the device has been compromised, such as disabling or bypassing android's fundamental security mechanisms).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-04-04
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Cleartext Storage of Sensitive Information.",
"role": "user"
},
{
"content": "CWE Code: 312\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Cleartext Storage of Sensitive Information\nSummary: amazon aws sdk <=2.8.5 for android uses android sharedpreferences to store plain text aws sts temporary credentials retrieved by aws cognito identity service. an attacker can use these credentials to create authenticated and/or authorized requests. note that the attacker must have \"root\" privilege access to the android filesystem in order to exploit this vulnerability (i.e. the device has been compromised, such as disabling or bypassing android's fundamental security mechanisms).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-04-04\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an elevation of privilege vulnerability exists when directx improperly handles objects in memory, aka 'directx elevation of privilege vulnerability'.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-09-11
Last Modified Date: 2019-09-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an elevation of privilege vulnerability exists when directx improperly handles objects in memory, aka 'directx elevation of privilege vulnerability'.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-09-11\nLast Modified Date: 2019-09-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection exists in the gallery wd 1.3.6 component for joomla! via the tag_id parameter or gallery_id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-02-17
Last Modified Date: 2018-03-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in the gallery wd 1.3.6 component for joomla! via the tag_id parameter or gallery_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-02-17\nLast Modified Date: 2018-03-02",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Permissions Privileges and Access Controls
Summary: the read_config_file function in lib/hesiod.c in hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the dns cache.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-03-28
Last Modified Date: 2018-10-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: the read_config_file function in lib/hesiod.c in hesiod 3.2.1 falls back to the \".athena.mit.edu\" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the dns cache.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-03-28\nLast Modified Date: 2018-10-21",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the jphoto (com_jphoto) component 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a category action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-01-12
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the jphoto (com_jphoto) component 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a category action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-01-12\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 310
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Cryptographic Issues
Summary: kerberos in microsoft windows xp sp2 and sp3 and server 2003 sp2 supports weak hashing algorithms, which allows local users to gain privileges by operating a service that sends crafted service tickets, as demonstrated by the crc32 algorithm, aka "kerberos unkeyed checksum vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2011-02-10
Last Modified Date: 2019-02-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Cryptographic Issues.",
"role": "user"
},
{
"content": "CWE Code: 310\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Cryptographic Issues\nSummary: kerberos in microsoft windows xp sp2 and sp3 and server 2003 sp2 supports weak hashing algorithms, which allows local users to gain privileges by operating a service that sends crafted service tickets, as demonstrated by the crc32 algorithm, aka \"kerberos unkeyed checksum vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2011-02-10\nLast Modified Date: 2019-02-26",
"role": "assistant"
}
] |
CWE Code: 134
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Use of Externally-Controlled Format String
Summary: ubiquiti networks edgeswitch version 1.7.3 and prior suffer from an externally controlled format-string vulnerability due to lack of protection on the admin cli, leading to code execution and privilege escalation greater than administrators themselves are allowed. an attacker with access to an admin account could escape the restricted cli and execute arbitrary code.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-06-20
Last Modified Date: 2018-08-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Use of Externally-Controlled Format String.",
"role": "user"
},
{
"content": "CWE Code: 134\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Use of Externally-Controlled Format String\nSummary: ubiquiti networks edgeswitch version 1.7.3 and prior suffer from an externally controlled format-string vulnerability due to lack of protection on the admin cli, leading to code execution and privilege escalation greater than administrators themselves are allowed. an attacker with access to an admin account could escape the restricted cli and execute arbitrary code.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-06-20\nLast Modified Date: 2018-08-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the calendar module in vtiger crm 5.2.1 and earlier allows remote attackers to execute arbitrary sql commands via the onlyforuser parameter in an index action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-11-28
Last Modified Date: 2018-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the calendar module in vtiger crm 5.2.1 and earlier allows remote attackers to execute arbitrary sql commands via the onlyforuser parameter in an index action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-28\nLast Modified Date: 2018-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the counter module for drupal allows remote attackers to execute arbitrary sql commands via unspecified vectors related to "recording visits."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-06-21
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the counter module for drupal allows remote attackers to execute arbitrary sql commands via unspecified vectors related to \"recording visits.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-06-21\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 476
Vulnerability Type: sql_injection
CVSS Score: 5.0
CWE Name: NULL Pointer Dereference
Summary: in sqlite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a null pointer dereference in fts5chunkiterate in sqlite3.c. this is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-03-22
Last Modified Date: 2019-06-04 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: NULL Pointer Dereference.",
"role": "user"
},
{
"content": "CWE Code: 476\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: NULL Pointer Dereference\nSummary: in sqlite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a null pointer dereference in fts5chunkiterate in sqlite3.c. this is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-03-22\nLast Modified Date: 2019-06-04",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in admin/authenticate.asp in battle blog 1.25 and 1.30 build 2 allows remote attackers to execute arbitrary sql commands via the username parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-10-16
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in admin/authenticate.asp in battle blog 1.25 and 1.30 build 2 allows remote attackers to execute arbitrary sql commands via the username parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-10-16\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the windows kernel-mode drivers in win32k.sys in microsoft windows xp sp2 and sp3, and windows server 2003 sp2, do not properly handle unspecified exceptions, which allows local users to gain privileges via a crafted application, aka "win32k exception handling vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-08-11
Last Modified Date: 2019-02-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the windows kernel-mode drivers in win32k.sys in microsoft windows xp sp2 and sp3, and windows server 2003 sp2, do not properly handle unspecified exceptions, which allows local users to gain privileges via a crafted application, aka \"win32k exception handling vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-08-11\nLast Modified Date: 2019-02-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in products.php in commodityrentals trade manager script allows remote attackers to execute arbitrary sql commands via the cid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-02-23
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in products.php in commodityrentals trade manager script allows remote attackers to execute arbitrary sql commands via the cid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-02-23\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an issue was discovered in certain apple products. ios before 10.2 is affected. macos before 10.12.2 is affected. watchos before 3.1.3 is affected. the issue involves the "kernel" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-02-20
Last Modified Date: 2018-10-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 10.2 is affected. macos before 10.12.2 is affected. watchos before 3.1.3 is affected. the issue involves the \"kernel\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-02-20\nLast Modified Date: 2018-10-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in reciprocal links manager 1.1 allows remote attackers to execute arbitrary sql commands via the site parameter in an open action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-09-15
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in reciprocal links manager 1.1 allows remote attackers to execute arbitrary sql commands via the site parameter in an open action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-09-15\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in admin/admin.php in realty webware technologies realty web-base 1.0 allow remote attackers to execute arbitrary sql commands via the (1) user (username) and (2) password parameters. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-05-18
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in admin/admin.php in realty webware technologies realty web-base 1.0 allow remote attackers to execute arbitrary sql commands via the (1) user (username) and (2) password parameters. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-05-18\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: local attackers can trigger a stack-based buffer overflow on vulnerable installations of antiy-avl atool security management v1.0.0.22. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. the specific flaw exists within the processing of ioctl 0x80002000 by the irpfile.sys antiy-avl atool kernel driver. the bug is caused by failure to properly validate the length of the user-supplied data, which results in a kernel stack buffer overflow. an attacker can leverage this vulnerability to execute arbitrary code in the context of the kernel, which could lead to privilege escalation and a failed exploit could lead to denial of service.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-12-05
Last Modified Date: 2019-01-04 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: local attackers can trigger a stack-based buffer overflow on vulnerable installations of antiy-avl atool security management v1.0.0.22. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. the specific flaw exists within the processing of ioctl 0x80002000 by the irpfile.sys antiy-avl atool kernel driver. the bug is caused by failure to properly validate the length of the user-supplied data, which results in a kernel stack buffer overflow. an attacker can leverage this vulnerability to execute arbitrary code in the context of the kernel, which could lead to privilege escalation and a failed exploit could lead to denial of service.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-12-05\nLast Modified Date: 2019-01-04",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: race condition in the ptrace_attach function in kernel/ptrace.c in the linux kernel before 2.6.30-rc4 allows local users to gain privileges via a ptrace_attach ptrace call during an exec system call that is launching a setuid application, related to locking an incorrect cred_exec_mutex object.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2009-05-05
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: race condition in the ptrace_attach function in kernel/ptrace.c in the linux kernel before 2.6.30-rc4 allows local users to gain privileges via a ptrace_attach ptrace call during an exec system call that is launching a setuid application, related to locking an incorrect cred_exec_mutex object.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2009-05-05\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the simple gallery (sk_simplegallery) extension 0.0.9 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-03-19
Last Modified Date: 2010-03-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the simple gallery (sk_simplegallery) extension 0.0.9 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-19\nLast Modified Date: 2010-03-22",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Input Validation
Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: replication). supported versions that are affected are 5.7.16 and earlier. easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss v3.0 base score 6.5 (availability impacts).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2017-01-27
Last Modified Date: 2017-12-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Input Validation\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: replication). supported versions that are affected are 5.7.16 and earlier. easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss v3.0 base score 6.5 (availability impacts).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2017-01-27\nLast Modified Date: 2017-12-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in develop it easy news and article system 1.4 allow remote attackers to execute arbitrary sql commands via (1) the aid parameter to article_details.php, and the (2) username and (3) password to the admin panel (admin/index.php).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-11-18
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in develop it easy news and article system 1.4 allow remote attackers to execute arbitrary sql commands via (1) the aid parameter to article_details.php, and the (2) username and (3) password to the admin panel (admin/index.php).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-11-18\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in video community portal allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-10-25
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in video community portal allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-10-25\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: interspire email marketer through 6.1.6 has sql injection via an updateblock sortorder request to dynamiccontenttags.php
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-11-26
Last Modified Date: 2018-12-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: interspire email marketer through 6.1.6 has sql injection via an updateblock sortorder request to dynamiccontenttags.php\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-11-26\nLast Modified Date: 2018-12-18",
"role": "assistant"
}
] |
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 4.4
CWE Name: Untrusted Search Path
Summary: untrusted search path vulnerability in the installer for truecrypt 7.2 and 7.1a, veracrypt before 1.17-beta, and possibly other products allows local users to execute arbitrary code with administrator privileges and conduct dll hijacking attacks via a trojan horse dll in the "application directory", as demonstrated with the usp10.dll, riched20.dll, ntmarta.dll and srclient.dll dlls.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-01-23
Last Modified Date: 2017-01-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in the installer for truecrypt 7.2 and 7.1a, veracrypt before 1.17-beta, and possibly other products allows local users to execute arbitrary code with administrator privileges and conduct dll hijacking attacks via a trojan horse dll in the \"application directory\", as demonstrated with the usp10.dll, riched20.dll, ntmarta.dll and srclient.dll dlls.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-01-23\nLast Modified Date: 2017-01-27",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Permissions Privileges and Access Controls
Summary: monkey http daemon 0.9.3 uses a real uid of root and a real gid of root during execution of cgi scripts, which might allow local users to gain privileges by leveraging cgi-bin write access.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2012-10-05
Last Modified Date: 2012-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: monkey http daemon 0.9.3 uses a real uid of root and a real gid of root during execution of cgi scripts, which might allow local users to gain privileges by leveraging cgi-bin write access.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-10-05\nLast Modified Date: 2012-10-10",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 7.1
CWE Name: Out-of-bounds Read
Summary: in ce_t4t_data_cback of ce_t4t.cc, there is a possible out-of-bound read due to a missing bounds check. this could lead to local information disclosure with no additional execution privileges needed. user interaction is needed for exploitation.product: androidversions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9android id: a-115635871
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/NONE/NONE
Published Date: 2019-06-19
Last Modified Date: 2019-06-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 7.1\nCWE Name: Out-of-bounds Read\nSummary: in ce_t4t_data_cback of ce_t4t.cc, there is a possible out-of-bound read due to a missing bounds check. this could lead to local information disclosure with no additional execution privileges needed. user interaction is needed for exploitation.product: androidversions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9android id: a-115635871\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/NONE/NONE\nPublished Date: 2019-06-19\nLast Modified Date: 2019-06-21",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Out-of-bounds Write
Summary: in nfc server, there is a possible out of bounds write due to a missing bounds check. this could lead to local escalation of privilege in the system server with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-122361874
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-09-27
Last Modified Date: 2019-10-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Out-of-bounds Write\nSummary: in nfc server, there is a possible out of bounds write due to a missing bounds check. this could lead to local escalation of privilege in the system server with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-122361874\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: zoho manageengine applications manager 13 before build 13530 allows sql injection via the /showresource.do resourceid parameter in a getresourceprofiles action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-11-16
Last Modified Date: 2018-08-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: zoho manageengine applications manager 13 before build 13530 allows sql injection via the /showresource.do resourceid parameter in a getresourceprofiles action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-11-16\nLast Modified Date: 2018-08-28",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the staprun runtime tool in systemtap 1.3 does not properly clear the environment before executing modprobe, which allows local users to gain privileges by setting the modprobe_options environment variable to specify a malicious configuration file.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-12-07
Last Modified Date: 2019-04-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the staprun runtime tool in systemtap 1.3 does not properly clear the environment before executing modprobe, which allows local users to gain privileges by setting the modprobe_options environment variable to specify a malicious configuration file.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-12-07\nLast Modified Date: 2019-04-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: openforis arena before 2019-05-07 allows sql injection in the sorting feature.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-08-26
Last Modified Date: 2019-08-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: openforis arena before 2019-05-07 allows sql injection in the sorting feature.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-26\nLast Modified Date: 2019-08-28",
"role": "assistant"
}
] |
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Untrusted Search Path
Summary: untrusted search path vulnerability in the installer of microsoft teams allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-03-12
Last Modified Date: 2019-03-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in the installer of microsoft teams allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-03-12\nLast Modified Date: 2019-03-13",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in includes/functions.php in pro chat rooms text chat rooms 8.2.0 allow remote authenticated users to execute arbitrary sql commands via the (1) password, (2) email, or (3) id parameter.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-10-20
Last Modified Date: 2017-09-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in includes/functions.php in pro chat rooms text chat rooms 8.2.0 allow remote authenticated users to execute arbitrary sql commands via the (1) password, (2) email, or (3) id parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-10-20\nLast Modified Date: 2017-09-08",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: sql_injection
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an exploitable stack-based buffer overflow vulnerability exists in the retrieval of a database field in video-core's http server of samsung smartthings hub. the video-core process insecurely extracts the shard.videohosturl field from its sqlite database, leading to a buffer overflow on the stack. an attacker can send an http request to trigger this vulnerability.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-09-21
Last Modified Date: 2018-11-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: sql_injection\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an exploitable stack-based buffer overflow vulnerability exists in the retrieval of a database field in video-core's http server of samsung smartthings hub. the video-core process insecurely extracts the shard.videohosturl field from its sqlite database, leading to a buffer overflow on the stack. an attacker can send an http request to trigger this vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-09-21\nLast Modified Date: 2018-11-21",
"role": "assistant"
}
] |
CWE Code: 862
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Missing Authorization
Summary: dde-daemon, the daemon process of dde (deepin desktop environment) 15.0 through 15.3, runs with root privileges and hardly does anything to identify the user who calls the function through d-bus. anybody can change the grub config, even to append some arguments to make a backdoor or privilege escalation, by calling dowritegrubsettings() provided by dde-daemon.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-04-10
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Missing Authorization.",
"role": "user"
},
{
"content": "CWE Code: 862\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Missing Authorization\nSummary: dde-daemon, the daemon process of dde (deepin desktop environment) 15.0 through 15.3, runs with root privileges and hardly does anything to identify the user who calls the function through d-bus. anybody can change the grub config, even to append some arguments to make a backdoor or privilege escalation, by calling dowritegrubsettings() provided by dde-daemon.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-04-10\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in compte.php in phpmyshop 1.00 allows remote attackers to execute arbitrary sql commands via the (1) identifiant and (2) password parameters.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2003-12-31
Last Modified Date: 2018-10-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in compte.php in phpmyshop 1.00 allows remote attackers to execute arbitrary sql commands via the (1) identifiant and (2) password parameters.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2003-12-31\nLast Modified Date: 2018-10-19",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Permissions Privileges and Access Controls
Summary: the hesiod_init function in lib/hesiod.c in hesiod 3.2.1 compares euid with uid to determine whether to use configurations from environment variables, which allows local users to gain privileges via the (1) hesiod_config or (2) hes_domain environment variable and leveraging certain suid/sguid binary.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-03-01
Last Modified Date: 2018-10-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: the hesiod_init function in lib/hesiod.c in hesiod 3.2.1 compares euid with uid to determine whether to use configurations from environment variables, which allows local users to gain privileges via the (1) hesiod_config or (2) hes_domain environment variable and leveraging certain suid/sguid binary.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-03-01\nLast Modified Date: 2018-10-21",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: flashlingo before 2019-06-12 allows sql injection, related to flashlingo.js and db.js.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-08-26
Last Modified Date: 2019-08-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: flashlingo before 2019-06-12 allows sql injection, related to flashlingo.js and db.js.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-26\nLast Modified Date: 2019-08-28",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 7.6
CWE Name: Improper Access Control
Summary: an elevation of privilege vulnerability in the htc sound codec driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31386004.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-01-12
Last Modified Date: 2017-01-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Improper Access Control\nSummary: an elevation of privilege vulnerability in the htc sound codec driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31386004.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-01-19",
"role": "assistant"
}
] |
CWE Code: 502
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Deserialization of Untrusted Data
Summary: in laravel framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted x-xsrf-token value. this involves the decrypt method in illuminate/encryption/encrypter.php and pendingbroadcast in gadgetchains/laravel/rce/3/chain.php in phpggc. the attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-08-09
Last Modified Date: 2019-07-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Deserialization of Untrusted Data.",
"role": "user"
},
{
"content": "CWE Code: 502\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Deserialization of Untrusted Data\nSummary: in laravel framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted x-xsrf-token value. this involves the decrypt method in illuminate/encryption/encrypter.php and pendingbroadcast in gadgetchains/laravel/rce/3/chain.php in phpggc. the attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-08-09\nLast Modified Date: 2019-07-15",
"role": "assistant"
}
] |
CWE Code: 77
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary: a vulnerability in the cli parser of cisco ios xe software could allow an authenticated, local attacker to execute commands on the underlying linux shell of an affected device with root privileges. the vulnerability exist because the affected software improperly sanitizes command arguments, failing to prevent access to certain internal data structures on an affected device. an attacker who has privileged exec mode (privilege level 15) access to an affected device could exploit these vulnerabilities on the device by executing cli commands that contain custom arguments. a successful exploit could allow the attacker to execute arbitrary commands with root privileges on the affected device.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-10-05
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in a Command ('Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 77\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')\nSummary: a vulnerability in the cli parser of cisco ios xe software could allow an authenticated, local attacker to execute commands on the underlying linux shell of an affected device with root privileges. the vulnerability exist because the affected software improperly sanitizes command arguments, failing to prevent access to certain internal data structures on an affected device. an attacker who has privileged exec mode (privilege level 15) access to an affected device could exploit these vulnerabilities on the device by executing cli commands that contain custom arguments. a successful exploit could allow the attacker to execute arbitrary commands with root privileges on the affected device.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-10-05\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: in apache fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, the system exposes different rest end points to query domain specific entities with a query parameter 'orderby' and 'sortorder' which are appended directly with sql statements. a hacker/user can inject/draft the 'orderby' and 'sortorder' query parameter in such a way to read/update the data for which he doesn't have authorization.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-04-20
Last Modified Date: 2018-05-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: in apache fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, the system exposes different rest end points to query domain specific entities with a query parameter 'orderby' and 'sortorder' which are appended directly with sql statements. a hacker/user can inject/draft the 'orderby' and 'sortorder' query parameter in such a way to read/update the data for which he doesn't have authorization.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-04-20\nLast Modified Date: 2018-05-22",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the web_links module for php-nuke 8.0 allows remote attackers to execute arbitrary sql commands via the url parameter in an add action to modules.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-02-14
Last Modified Date: 2019-07-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the web_links module for php-nuke 8.0 allows remote attackers to execute arbitrary sql commands via the url parameter in an add action to modules.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-02-14\nLast Modified Date: 2019-07-01",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: idseq-web before 2019-07-01 in infectious disease sequencing platform idseq allows sql injection via tax_levels.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-08-26
Last Modified Date: 2019-08-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: idseq-web before 2019-07-01 in infectious disease sequencing platform idseq allows sql injection via tax_levels.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-26\nLast Modified Date: 2019-08-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in account/index.php in toppermod 2.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via a non-alphanumeric first character the localita parameter, which bypasses a protection mechanism.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-03-31
Last Modified Date: 2018-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in account/index.php in toppermod 2.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via a non-alphanumeric first character the localita parameter, which bypasses a protection mechanism.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-03-31\nLast Modified Date: 2018-10-11",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: adobe experience manager versions 6.4 and 6.3 have a stored cross site scripting vulnerability. successful exploitation could lead to privilege escalation.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2019-10-24
Last Modified Date: 2019-10-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: adobe experience manager versions 6.4 and 6.3 have a stored cross site scripting vulnerability. successful exploitation could lead to privilege escalation.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-10-24\nLast Modified Date: 2019-10-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in katalog stron hurricane 1.3.5, and possibly earlier, allows remote attackers to execute arbitrary sql commands via the get parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-02-22
Last Modified Date: 2010-02-23 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in katalog stron hurricane 1.3.5, and possibly earlier, allows remote attackers to execute arbitrary sql commands via the get parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-02-22\nLast Modified Date: 2010-02-23",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in open source security information management (ossim) before 2.1.2 allow remote authenticated users to execute arbitrary sql commands via the id_document parameter to (1) repository_document.php, (2) repository_links.php, and (3) repository_editdocument.php in repository/; the (4) group parameter to policy/getpolicy.php; the name parameter to (5) host/newhostgroupform.php and (6) net/modifynetform.php; and unspecified other vectors related to the policy menu.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-09-28
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in open source security information management (ossim) before 2.1.2 allow remote authenticated users to execute arbitrary sql commands via the id_document parameter to (1) repository_document.php, (2) repository_links.php, and (3) repository_editdocument.php in repository/; the (4) group parameter to policy/getpolicy.php; the name parameter to (5) host/newhostgroupform.php and (6) net/modifynetform.php; and unspecified other vectors related to the policy menu.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-09-28\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 522
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Insufficiently Protected Credentials
Summary: dell emc integrated data protection appliance versions prior to 2.3 contain a password storage vulnerability in the acm component. a remote authenticated malicious user with root privileges may potentially use a support tool to decrypt encrypted passwords stored locally on the system to use it to access other components using the privileges of the compromised user.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-27
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Insufficiently Protected Credentials.",
"role": "user"
},
{
"content": "CWE Code: 522\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Insufficiently Protected Credentials\nSummary: dell emc integrated data protection appliance versions prior to 2.3 contain a password storage vulnerability in the acm component. a remote authenticated malicious user with root privileges may potentially use a support tool to decrypt encrypted passwords stored locally on the system to use it to access other components using the privileges of the compromised user.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in signature.php in advanced forum signatures plugin (aka afsignatures) 2.0.4 for mybb allows remote attackers to execute arbitrary sql commands via the afs_bar_right parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-04-08
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in signature.php in advanced forum signatures plugin (aka afsignatures) 2.0.4 for mybb allows remote attackers to execute arbitrary sql commands via the afs_bar_right parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-04-08\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in demo.php in typing pal 1.0 and earlier allows remote attackers to execute arbitrary sql commands via the idtableproduit parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-05-11
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in demo.php in typing pal 1.0 and earlier allows remote attackers to execute arbitrary sql commands via the idtableproduit parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-05-11\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the api in ibm openpages grc platform 7.0 before 7.0.0.4 if3 and 7.1 before 7.1.0.1 if6 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-01-01
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the api in ibm openpages grc platform 7.0 before 7.0.0.4 if3 and 7.1 before 7.1.0.1 if6 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-01-01\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in searchresults.php in php autos 2.9.1 allows remote attackers to execute arbitrary sql commands via the catid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-09
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in searchresults.php in php autos 2.9.1 allows remote attackers to execute arbitrary sql commands via the catid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-09\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Input Validation
Summary: untrusted search path vulnerability in sap enterprise central component (ecc) allows local users to gain privileges via a trojan horse program.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-07-16
Last Modified Date: 2015-07-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Input Validation\nSummary: untrusted search path vulnerability in sap enterprise central component (ecc) allows local users to gain privileges via a trojan horse program.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-07-16\nLast Modified Date: 2015-07-21",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Privilege Management
Summary: nagios core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-09-11
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Privilege Management\nSummary: nagios core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-09-11\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: dedecms through 5.7 has sql injection via the $_files superglobal to plus/recommend.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-18
Last Modified Date: 2018-01-04 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: dedecms through 5.7 has sql injection via the $_files superglobal to plus/recommend.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-18\nLast Modified Date: 2018-01-04",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Out-of-bounds Read
Summary: in bluetooth, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-111213909
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-27
Last Modified Date: 2019-10-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Out-of-bounds Read\nSummary: in bluetooth, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-111213909\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-01",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: an elevation of privilege vulnerability in the qualcomm bootloader could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: n/a. android id: a-32952839. references: qc-cr#1094105.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-05-12
Last Modified Date: 2017-05-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability in the qualcomm bootloader could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: n/a. android id: a-32952839. references: qc-cr#1094105.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-05-12\nLast Modified Date: 2017-05-19",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Improper Input Validation
Summary: mozilla firefox 38.0 and firefox esr 38.0 allow user-assisted remote attackers to read arbitrary files or execute arbitrary javascript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions. note: this vulnerability exists because of a cve-2015-0821 regression.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-07-06
Last Modified Date: 2016-12-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Input Validation\nSummary: mozilla firefox 38.0 and firefox esr 38.0 allow user-assisted remote attackers to read arbitrary files or execute arbitrary javascript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions. note: this vulnerability exists because of a cve-2015-0821 regression.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-07-06\nLast Modified Date: 2016-12-28",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Information Exposure
Summary: sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed error messages about the results of privileged file-access attempts, which allows local users to determine the existence of arbitrary files via the mountpoint name.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2010-03-10
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Information Exposure\nSummary: sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed error messages about the results of privileged file-access attempts, which allows local users to determine the existence of arbitrary files via the mountpoint name.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2010-03-10\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in tr.php in downlinegoldmine special category addon, downline builder pro, new addon, and downline goldmine builder allows remote attackers to execute arbitrary sql commands via the id parameter. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-09-23
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in tr.php in downlinegoldmine special category addon, downline builder pro, new addon, and downline goldmine builder allows remote attackers to execute arbitrary sql commands via the id parameter. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-09-23\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Information Exposure
Summary: vulnerability in the oracle hospitality suite8 component of oracle hospitality applications (subcomponent: leisure). supported versions that are affected are 8.10.1 and 8.10.2. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle hospitality suite8. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle hospitality suite8 accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2017-10-19
Last Modified Date: 2017-10-23 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: vulnerability in the oracle hospitality suite8 component of oracle hospitality applications (subcomponent: leisure). supported versions that are affected are 8.10.1 and 8.10.2. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle hospitality suite8. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle hospitality suite8 accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-10-19\nLast Modified Date: 2017-10-23",
"role": "assistant"
}
] |
CWE Code: 255
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Credentials Management
Summary: green packet dx-350 uses non-random default credentials of: root:wimax. a remote network attacker can gain privileged access to a vulnerable device.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-07-13
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Credentials Management.",
"role": "user"
},
{
"content": "CWE Code: 255\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Credentials Management\nSummary: green packet dx-350 uses non-random default credentials of: root:wimax. a remote network attacker can gain privileged access to a vulnerable device.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-07-13\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in phpfox before 3.6.0 (build6) allows remote attackers to execute arbitrary sql commands via the search[sort_by] parameter to user/browse/view_/.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2013-08-14
Last Modified Date: 2013-08-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in phpfox before 3.6.0 (build6) allows remote attackers to execute arbitrary sql commands via the search[sort_by] parameter to user/browse/view_/.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-08-14\nLast Modified Date: 2013-08-14",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: the driver_override implementation in drivers/base/platform.c in the linux kernel before 4.12.1 allows local users to gain privileges by leveraging a race condition between a read operation and a store operation that involve different overrides.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-09-08
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: the driver_override implementation in drivers/base/platform.c in the linux kernel before 4.12.1 allows local users to gain privileges by leveraging a race condition between a read operation and a store operation that involve different overrides.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-09-08\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: a local privilege escalation vulnerability exists in trend micro security 2019 (v15.0) in which, if exploited, would allow an attacker to manipulate a specific product feature to load a malicious service.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-08-21
Last Modified Date: 2019-08-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: a local privilege escalation vulnerability exists in trend micro security 2019 (v15.0) in which, if exploited, would allow an attacker to manipulate a specific product feature to load a malicious service.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-08-21\nLast Modified Date: 2019-08-28",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Permissions Privileges and Access Controls
Summary: connection.php in flashchat 5.0.8 allows remote attackers to bypass the role filter mechanism and gain administrative privileges by setting the s parameter to "7."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-05-07
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: connection.php in flashchat 5.0.8 allows remote attackers to bypass the role filter mechanism and gain administrative privileges by setting the s parameter to \"7.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-05-07\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: ndproxy.sys in the kernel in microsoft windows xp sp2 and sp3 and server 2003 sp2 allows local users to gain privileges via a crafted application, as exploited in the wild in november 2013. per: http://technet.microsoft.com/en-us/security/bulletin/ms14-002
"this security update also addresses the vulnerability first described in microsoft security advisory 2814486."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-11-28
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: ndproxy.sys in the kernel in microsoft windows xp sp2 and sp3 and server 2003 sp2 allows local users to gain privileges via a crafted application, as exploited in the wild in november 2013. per: http://technet.microsoft.com/en-us/security/bulletin/ms14-002\r\n\r\n\"this security update also addresses the vulnerability first described in microsoft security advisory 2814486.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-11-28\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.4
CWE Name: Permissions Privileges and Access Controls
Summary: pure-ftpd 1.0.22, as used in suse linux enterprise server 10 sp3 and sp4, and enterprise desktop 10 sp3 and sp4, when running oes netware extensions, creates a world-writeable directory, which allows local users to overwrite arbitrary files and gain privileges via unspecified vectors.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-04-18
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Permissions Privileges and Access Controls\nSummary: pure-ftpd 1.0.22, as used in suse linux enterprise server 10 sp3 and sp4, and enterprise desktop 10 sp3 and sp4, when running oes netware extensions, creates a world-writeable directory, which allows local users to overwrite arbitrary files and gain privileges via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-04-18\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Improper Access Control
Summary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.32 and prior to 6.0.10. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of oracle vm virtualbox. cvss 3.0 base score 6.5 (availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:n/i:n/a:h).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-07-23
Last Modified Date: 2019-07-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.32 and prior to 6.0.10. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of oracle vm virtualbox. cvss 3.0 base score 6.5 (availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:n/i:n/a:h).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-07-23\nLast Modified Date: 2019-07-30",
"role": "assistant"
}
] |