text
stringlengths 365
3.97k
| conversations
listlengths 3
3
|
---|---|
CWE Code: 78
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary: a vulnerability in the cli parser of cisco ios xe software could allow an authenticated, local attacker to gain access to the underlying linux shell of an affected device and execute arbitrary commands with root privileges on the device. the vulnerability is due to the affected software improperly sanitizing command arguments to prevent access to internal data structures on a device. an attacker who has privileged exec mode (privilege level 15) access to an affected device could exploit this vulnerability on the device by executing cli commands that contain crafted arguments. a successful exploit could allow the attacker to gain access to the underlying linux shell of the affected device and execute arbitrary commands with root privileges on the device. cisco bug ids: cscuv91356.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-03-28
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: a vulnerability in the cli parser of cisco ios xe software could allow an authenticated, local attacker to gain access to the underlying linux shell of an affected device and execute arbitrary commands with root privileges on the device. the vulnerability is due to the affected software improperly sanitizing command arguments to prevent access to internal data structures on a device. an attacker who has privileged exec mode (privilege level 15) access to an affected device could exploit this vulnerability on the device by executing cli commands that contain crafted arguments. a successful exploit could allow the attacker to gain access to the underlying linux shell of the affected device and execute arbitrary commands with root privileges on the device. cisco bug ids: cscuv91356.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-03-28\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: multiple buffer overflows in intel amt in intel csme firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with intel amt execution privilege via local access.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-09-12
Last Modified Date: 2019-02-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: multiple buffer overflows in intel amt in intel csme firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with intel amt execution privilege via local access.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-09-12\nLast Modified Date: 2019-02-28",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: all versions of nvidia windows gpu display driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for dxgkddiescapeid 0x100008b where user provided input is used as the limit for a loop may lead to denial of service or potential escalation of privileges
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-02-15
Last Modified Date: 2017-09-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: all versions of nvidia windows gpu display driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for dxgkddiescapeid 0x100008b where user provided input is used as the limit for a loop may lead to denial of service or potential escalation of privileges\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-02-15\nLast Modified Date: 2017-09-01",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Permissions Privileges and Access Controls
Summary: the listview control in the client gui (aclient.exe) in symantec altiris deployment solution 6.x before 6.9.355 sp1 allows local users to gain system privileges and execute arbitrary commands via a "shatter" style attack on the "command prompt" hidden gui button to (1) overwrite the commandline parameter to cmd.exe to use system privileges and (2) modify the dll that is loaded using the loadlibrary api function.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2009-06-08
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: the listview control in the client gui (aclient.exe) in symantec altiris deployment solution 6.x before 6.9.355 sp1 allows local users to gain system privileges and execute arbitrary commands via a \"shatter\" style attack on the \"command prompt\" hidden gui button to (1) overwrite the commandline parameter to cmd.exe to use system privileges and (2) modify the dll that is loaded using the loadlibrary api function.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2009-06-08\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 285
Vulnerability Type: privilege_escalation
CVSS Score: 3.6
CWE Name: Improper Authorization
Summary: the filesystem implementation in the linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/NONE
Published Date: 2016-10-16
Last Modified Date: 2018-01-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Authorization.",
"role": "user"
},
{
"content": "CWE Code: 285\nVulnerability Type: privilege_escalation\nCVSS Score: 3.6\nCWE Name: Improper Authorization\nSummary: the filesystem implementation in the linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2016-10-16\nLast Modified Date: 2018-01-05",
"role": "assistant"
}
] |
CWE Code: 120
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary: an elevation of privilege vulnerability exists in the network driver interface specification (ndis) when ndis.sys fails to check the length of a buffer prior to copying memory to it, aka "windows ndis elevation of privilege vulnerability." this affects windows 7, windows server 2008 r2. this cve id is unique from cve-2018-8343.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-08-15
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow').",
"role": "user"
},
{
"content": "CWE Code: 120\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')\nSummary: an elevation of privilege vulnerability exists in the network driver interface specification (ndis) when ndis.sys fails to check the length of a buffer prior to copying memory to it, aka \"windows ndis elevation of privilege vulnerability.\" this affects windows 7, windows server 2008 r2. this cve id is unique from cve-2018-8343.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-08-15\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Permissions Privileges and Access Controls
Summary: mozilla firefox and thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, mozilla suite before 1.7.13, and seamonkey before 1.0 does not properly protect the compilation scope of privileged built-in xbl bindings, which allows remote attackers to execute arbitrary code via the (1) valueof.call or (2) valueof.apply methods of an xbl binding, or (3) "by inserting an xbl method into the dom's document.body prototype chain." this vulnerability also affects mozilla, seamonkey, 1.0 and mozilla, suite, 1.7.13
this vulnerabiloity is addressed in the following product releases:
mozilla, firefox, 1.5
mozilla, firefox, 1.0.8
mozilla, thunderbird, 1.5
mozilla, thunderbird, 1.0.8
mozilla, seamonkey, 1.0
mozilla, suite, 1.7.13
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2006-04-14
Last Modified Date: 2018-10-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: mozilla firefox and thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, mozilla suite before 1.7.13, and seamonkey before 1.0 does not properly protect the compilation scope of privileged built-in xbl bindings, which allows remote attackers to execute arbitrary code via the (1) valueof.call or (2) valueof.apply methods of an xbl binding, or (3) \"by inserting an xbl method into the dom's document.body prototype chain.\" this vulnerability also affects mozilla, seamonkey, 1.0 and mozilla, suite, 1.7.13\r\n\r\nthis vulnerabiloity is addressed in the following product releases:\r\nmozilla, firefox, 1.5\r\nmozilla, firefox, 1.0.8\r\nmozilla, thunderbird, 1.5\r\nmozilla, thunderbird, 1.0.8\r\nmozilla, seamonkey, 1.0\r\nmozilla, suite, 1.7.13\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2006-04-14\nLast Modified Date: 2018-10-18",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Privilege Management
Summary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-1256.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-09-11
Last Modified Date: 2019-09-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Privilege Management\nSummary: an elevation of privilege vulnerability exists in windows when the win32k component fails to properly handle objects in memory, aka 'win32k elevation of privilege vulnerability'. this cve id is unique from cve-2019-1256.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-09-11\nLast Modified Date: 2019-09-12",
"role": "assistant"
}
] |
CWE Code: 94
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Improper Control of Generation of Code ('Code Injection')
Summary: cisco show and share 5(2), 5.2(1), and 5.2(2) before 5.2(2.1) allows remote authenticated users to upload and execute arbitrary code by leveraging video upload privileges, aka bug id cscto69857.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-10-20
Last Modified Date: 2012-01-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Control of Generation of Code ('Code Injection').",
"role": "user"
},
{
"content": "CWE Code: 94\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Control of Generation of Code ('Code Injection')\nSummary: cisco show and share 5(2), 5.2(1), and 5.2(2) before 5.2(2.1) allows remote authenticated users to upload and execute arbitrary code by leveraging video upload privileges, aka bug id cscto69857.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-10-20\nLast Modified Date: 2012-01-12",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 8.5
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: the kernel in apple ios before 9.3.2, os x before 10.11.5, tvos before 9.2.1, and watchos before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than cve-2016-1827, cve-2016-1828, and cve-2016-1829.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-05-20
Last Modified Date: 2019-03-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 8.5\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the kernel in apple ios before 9.3.2, os x before 10.11.5, tvos before 9.2.1, and watchos before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than cve-2016-1827, cve-2016-1828, and cve-2016-1829.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-05-20\nLast Modified Date: 2019-03-25",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the airiny abc (com_abc) component 1.1.7 for joomla! allows remote attackers to execute arbitrary sql commands via the sectionid parameter in an abc action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-05-03
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the airiny abc (com_abc) component 1.1.7 for joomla! allows remote attackers to execute arbitrary sql commands via the sectionid parameter in an abc action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-05-03\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: the kernel in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 allows local users to gain privileges via a crafted application, aka "windows kernel memory corruption vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-10-14
Last Modified Date: 2019-05-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the kernel in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012 gold and r2, windows rt gold and 8.1, and windows 10 allows local users to gain privileges via a crafted application, aka \"windows kernel memory corruption vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-10-14\nLast Modified Date: 2019-05-15",
"role": "assistant"
}
] |
CWE Code: 190
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Integer Overflow or Wraparound
Summary: in mpeg4extractor, there is a possible out of bounds write due to an integer overflow. this could lead to remote code execution in the media extractor with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-111792351
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-09-27
Last Modified Date: 2019-10-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.",
"role": "user"
},
{
"content": "CWE Code: 190\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Integer Overflow or Wraparound\nSummary: in mpeg4extractor, there is a possible out of bounds write due to an integer overflow. this could lead to remote code execution in the media extractor with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-111792351\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in drupal and vbdrupal 4.7.x before 4.7.9 and 5.x before 5.4 allow remote attackers to execute arbitrary sql commands via modules that pass input to the taxonomy_select_nodes function, as demonstrated by the (1) taxonomy_menu, (2) ajaxloader, and (3) ubrowser contributed modules.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-12-10
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in drupal and vbdrupal 4.7.x before 4.7.9 and 5.x before 5.4 allow remote attackers to execute arbitrary sql commands via modules that pass input to the taxonomy_select_nodes function, as demonstrated by the (1) taxonomy_menu, (2) ajaxloader, and (3) ubrowser contributed modules.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-12-10\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in absolut engine 1.73 allow remote authenticated users to execute arbitrary sql commands via the (1) sectionid parameter to admin/managersection.php, (2) userid parameter to admin/edituser.php, (3) username parameter to admin/admin.php, or (4) title parameter to admin/managerrelated.php.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-01-02
Last Modified Date: 2015-01-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in absolut engine 1.73 allow remote authenticated users to execute arbitrary sql commands via the (1) sectionid parameter to admin/managersection.php, (2) userid parameter to admin/edituser.php, (3) username parameter to admin/admin.php, or (4) title parameter to admin/managerrelated.php.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-01-02\nLast Modified Date: 2015-01-05",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: all versions of nvidia windows gpu display driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for dxgddiescape where a value passed from a user to the driver is used without validation as the size input to memcpy(), causing a buffer overflow, leading to denial of service or potential escalation of privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-12-16
Last Modified Date: 2016-12-24 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: all versions of nvidia windows gpu display driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for dxgddiescape where a value passed from a user to the driver is used without validation as the size input to memcpy(), causing a buffer overflow, leading to denial of service or potential escalation of privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-12-16\nLast Modified Date: 2016-12-24",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka "microsoft sharepoint elevation of privilege vulnerability." this affects microsoft sharepoint server, microsoft sharepoint. this cve id is unique from cve-2018-1005, cve-2018-1014, cve-2018-1034.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2018-04-12
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft sharepoint server, microsoft sharepoint. this cve id is unique from cve-2018-1005, cve-2018-1014, cve-2018-1034.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2018-04-12\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in the hotel booking reservation system (aka hbs) for joomla! allow remote attackers to execute arbitrary sql commands via the id parameter in a showhoteldetails action to index.php in the (1) com_allhotels or (2) com_5starhotels module. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-01-08
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the hotel booking reservation system (aka hbs) for joomla! allow remote attackers to execute arbitrary sql commands via the id parameter in a showhoteldetails action to index.php in the (1) com_allhotels or (2) com_5starhotels module. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-01-08\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Information Exposure
Summary: emc rsa archer 5.4.1.3, 5.5.3.1, 5.5.2.3, 5.5.2, 5.5.1.3.1, 5.5.1.1 is affected by an information exposure through an error message vulnerability. a remote low privileged attacker may potentially exploit this vulnerability to use information disclosed in an error message to launch another more focused attack.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2017-07-07
Last Modified Date: 2017-07-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: emc rsa archer 5.4.1.3, 5.5.3.1, 5.5.2.3, 5.5.2, 5.5.1.3.1, 5.5.1.1 is affected by an information exposure through an error message vulnerability. a remote low privileged attacker may potentially exploit this vulnerability to use information disclosed in an error message to launch another more focused attack.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-07-07\nLast Modified Date: 2017-07-11",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: a sql injection vulnerability exists in pbootcms v1.3.2 via the description parameter in apps\admin\controller\content\contentcontroller.php.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-02-17
Last Modified Date: 2019-02-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection vulnerability exists in pbootcms v1.3.2 via the description parameter in apps\\admin\\controller\\content\\contentcontroller.php.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-02-17\nLast Modified Date: 2019-02-19",
"role": "assistant"
}
] |