text
stringlengths 365
3.97k
| conversations
listlengths 3
3
|
---|---|
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Permissions Privileges and Access Controls
Summary: mount.ecryptfs_private.c in ecryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-01-22
Last Modified Date: 2018-10-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: mount.ecryptfs_private.c in ecryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-01-22\nLast Modified Date: 2018-10-30",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 4.9
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: race condition in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2, r2, and r2 sp1, and windows 7 gold and sp1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other cves listed in ms13-016.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/NONE/NONE
Published Date: 2013-02-13
Last Modified Date: 2019-02-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: race condition in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2, r2, and r2 sp1, and windows 7 gold and sp1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other cves listed in ms13-016.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/NONE/NONE\nPublished Date: 2013-02-13\nLast Modified Date: 2019-02-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the easy-digital-downloads plugin before 2.3.3 for wordpress has sql injection.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-08-16
Last Modified Date: 2019-08-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the easy-digital-downloads plugin before 2.3.3 for wordpress has sql injection.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-16\nLast Modified Date: 2019-08-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in ibm algo one, as used in metadata management tools in uds 4.7.0 through 5.0.0, acsweb in algo security access control management 4.7.0 through 4.9.0, and acsweb in algowebapps 5.0.0, allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, a different vulnerability than cve-2013-6331.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-03-05
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in ibm algo one, as used in metadata management tools in uds 4.7.0 through 5.0.0, acsweb in algo security access control management 4.7.0 through 4.9.0, and acsweb in algowebapps 5.0.0, allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, a different vulnerability than cve-2013-6331.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-03-05\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: openbravo business suite 3.0 is affected by sql injection. this vulnerability could allow remote authenticated attackers to inject arbitrary sql code.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-06-05
Last Modified Date: 2017-06-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: openbravo business suite 3.0 is affected by sql injection. this vulnerability could allow remote authenticated attackers to inject arbitrary sql code.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-06-05\nLast Modified Date: 2017-06-13",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.9
CWE Name: Permissions Privileges and Access Controls
Summary: at in bos.rte.cron on ibm aix 5.2.0, 5.3.0 through 5.3.9, and 6.1.0 through 6.1.2 allows local users to read arbitrary files via unspecified vectors, related to failure to drop root privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/NONE/NONE
Published Date: 2009-02-11
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: at in bos.rte.cron on ibm aix 5.2.0, 5.3.0 through 5.3.9, and 6.1.0 through 6.1.2 allows local users to read arbitrary files via unspecified vectors, related to failure to drop root privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/NONE/NONE\nPublished Date: 2009-02-11\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Information Exposure
Summary: this vulnerability allows local attackers to disclose sensitive information on vulnerable installations of samsung email fixed in version 5.0.02.16. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. the specific flaw exists within the handling of file:/// uris. the issue lies in the lack of proper validation of user-supplied data, which can allow for reading arbitrary files. an attacker can leverage this in conjunction with other vulnerabilities to escalate privileges. was zdi-can-5329.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2018-09-24
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Information Exposure\nSummary: this vulnerability allows local attackers to disclose sensitive information on vulnerable installations of samsung email fixed in version 5.0.02.16. an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. the specific flaw exists within the handling of file:/// uris. the issue lies in the lack of proper validation of user-supplied data, which can allow for reading arbitrary files. an attacker can leverage this in conjunction with other vulnerabilities to escalate privileges. was zdi-can-5329.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-09-24\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in includes/content/viewprod.inc.php in cubecart before 4.3.7 remote attackers to execute arbitrary sql commands via the productid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-11-24
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in includes/content/viewprod.inc.php in cubecart before 4.3.7 remote attackers to execute arbitrary sql commands via the productid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-11-24\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 416
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Use After Free
Summary: vmware workstation (15.x before 15.1.0) contains a use-after-free vulnerability in the advanced linux sound architecture (alsa) backend. a malicious user with normal user privileges on the guest machine may exploit this issue in conjunction with other issues to execute code on the linux host where workstation is installed.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-06-06
Last Modified Date: 2019-06-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Use After Free.",
"role": "user"
},
{
"content": "CWE Code: 416\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Use After Free\nSummary: vmware workstation (15.x before 15.1.0) contains a use-after-free vulnerability in the advanced linux sound architecture (alsa) backend. a malicious user with normal user privileges on the guest machine may exploit this issue in conjunction with other issues to execute code on the linux host where workstation is installed.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-06\nLast Modified Date: 2019-06-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in pkinc/public/article.php in phpkit 1.6.4pl1 allows remote attackers to execute arbitrary sql commands via the contentid parameter in an article action to include.php, a different vector than cve-2006-1773.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-11-27
Last Modified Date: 2017-10-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in pkinc/public/article.php in phpkit 1.6.4pl1 allows remote attackers to execute arbitrary sql commands via the contentid parameter in an article action to include.php, a different vector than cve-2006-1773.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-11-27\nLast Modified Date: 2017-10-19",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Out-of-bounds Read
Summary: in libxaac, there is a possible out of bounds read due to a missing bounds check. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-117495174
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-27
Last Modified Date: 2019-09-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Out-of-bounds Read\nSummary: in libxaac, there is a possible out of bounds read due to a missing bounds check. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-117495174\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: race condition in backend/ctrl.c in kdm in kde software compilation (sc) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-04-15
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: race condition in backend/ctrl.c in kdm in kde software compilation (sc) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-04-15\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in listing.php in gryphon gllcts2 4.2.4 allows remote attackers to execute arbitrary sql commands via the sort parameter.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-06-30
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in listing.php in gryphon gllcts2 4.2.4 allows remote attackers to execute arbitrary sql commands via the sort parameter.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-30\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in index.php in familyproject 2.0 allow remote attackers to execute arbitrary sql commands via (1) the logmbr parameter (aka login field) or (2) the mdpmbr parameter (aka pass or "mot de passe" field). note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-25
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in familyproject 2.0 allow remote attackers to execute arbitrary sql commands via (1) the logmbr parameter (aka login field) or (2) the mdpmbr parameter (aka pass or \"mot de passe\" field). note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-25\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in the starrating plugin before 0.7.7 for b2evolution allow remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-05-18
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the starrating plugin before 0.7.7 for b2evolution allow remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-05-18\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the payments plus component 2.1.5 for joomla! allows remote attackers to execute arbitrary sql commands via the type parameter to add.html.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-11-01
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the payments plus component 2.1.5 for joomla! allows remote attackers to execute arbitrary sql commands via the type parameter to add.html.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-01\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 255
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Credentials Management
Summary: ge healthcare precision thunis-800+ has a default password of (1) 1973 for the factory default system utilities menu, (2) th8740 for installation using th8740_122_setup.exe, (3) hrml for "setup and activation" using dsasetup, and (4) an empty string for shutter configuration, which has unspecified impact and attack vectors. note: since these passwords appear to be used to access functionality during installation, this issue might not cross privilege boundaries and might not be a vulnerability.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-08-04
Last Modified Date: 2018-03-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Credentials Management.",
"role": "user"
},
{
"content": "CWE Code: 255\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Credentials Management\nSummary: ge healthcare precision thunis-800+ has a default password of (1) 1973 for the factory default system utilities menu, (2) th8740 for installation using th8740_122_setup.exe, (3) hrml for \"setup and activation\" using dsasetup, and (4) an empty string for shutter configuration, which has unspecified impact and attack vectors. note: since these passwords appear to be used to access functionality during installation, this issue might not cross privilege boundaries and might not be a vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-08-04\nLast Modified Date: 2018-03-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in admin/login.asp in professional download assistant 0.1 allows remote attackers to execute arbitrary sql commands via the (1) uname parameter (aka user field) or the (2) psw parameter (aka passwd field). note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-12-15
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in admin/login.asp in professional download assistant 0.1 allows remote attackers to execute arbitrary sql commands via the (1) uname parameter (aka user field) or the (2) psw parameter (aka passwd field). note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-15\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in cisco prime collaboration provisioning 10.6 and 11.0 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscut64074.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-10-12
Last Modified Date: 2016-12-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in cisco prime collaboration provisioning 10.6 and 11.0 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscut64074.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-10-12\nLast Modified Date: 2016-12-09",
"role": "assistant"
}
] |
CWE Code: 399
Vulnerability Type: privilege_escalation
CVSS Score: 4.7
CWE Name: Resource Management Errors
Summary: the setup scripts in 389 directory server 1.2.x (aka red hat directory server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing pid files contained in this directory.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2011-02-23
Last Modified Date: 2011-03-31 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Resource Management Errors.",
"role": "user"
},
{
"content": "CWE Code: 399\nVulnerability Type: privilege_escalation\nCVSS Score: 4.7\nCWE Name: Resource Management Errors\nSummary: the setup scripts in 389 directory server 1.2.x (aka red hat directory server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing pid files contained in this directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2011-02-23\nLast Modified Date: 2011-03-31",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 1.9
CWE Name: Out-of-bounds Read
Summary: in nfc server, there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-120843827
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-27
Last Modified Date: 2019-10-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 1.9\nCWE Name: Out-of-bounds Read\nSummary: in nfc server, there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-120843827\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-02",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Information Exposure
Summary: vulnerability in the peoplesoft enterprise fscm component of oracle peoplesoft products (subcomponent: strategic sourcing). the supported version that is affected is 9.2. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise peoplesoft enterprise fscm. successful attacks of this vulnerability can result in unauthorized read access to a subset of peoplesoft enterprise fscm accessible data. cvss 3.0 base score 4.3 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:n).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2017-10-19
Last Modified Date: 2017-10-24 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Information Exposure\nSummary: vulnerability in the peoplesoft enterprise fscm component of oracle peoplesoft products (subcomponent: strategic sourcing). the supported version that is affected is 9.2. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise peoplesoft enterprise fscm. successful attacks of this vulnerability can result in unauthorized read access to a subset of peoplesoft enterprise fscm accessible data. cvss 3.0 base score 4.3 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:n).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-10-19\nLast Modified Date: 2017-10-24",
"role": "assistant"
}
] |
CWE Code: 189
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Numeric Errors
Summary: integer signedness error in the ttioctl function in bsd/kern/tty.c in the xnu kernel in apple mac os x 10.4 through 10.4.10 allows local users to cause a denial of service (system shutdown) or gain privileges via a crafted tiocsetd ioctl request.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2007-11-15
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Numeric Errors.",
"role": "user"
},
{
"content": "CWE Code: 189\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Numeric Errors\nSummary: integer signedness error in the ttioctl function in bsd/kern/tty.c in the xnu kernel in apple mac os x 10.4 through 10.4.10 allows local users to cause a denial of service (system shutdown) or gain privileges via a crafted tiocsetd ioctl request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2007-11-15\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in show.php in fascript faphoto 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-04-09
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in show.php in fascript faphoto 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-04-09\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Access Control
Summary: an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: kernel-3.10. android id: a-31222873. references: n-cve-2016-6775.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-01-12
Last Modified Date: 2017-10-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Access Control\nSummary: an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. product: android. versions: kernel-3.10. android id: a-31222873. references: n-cve-2016-6775.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-10-19",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: win32k.sys in the kernel-mode drivers in microsoft windows server 2008 r2 and windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "win32k memory corruption vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-12-16
Last Modified Date: 2018-10-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: win32k.sys in the kernel-mode drivers in microsoft windows server 2008 r2 and windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka \"win32k memory corruption vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-12-16\nLast Modified Date: 2018-10-30",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 2.6
CWE Name: Information Exposure
Summary: an information disclosure vulnerability in the qualcomm wi-fi driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-32074353. references: qc-cr#1104731.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2017-04-07
Last Modified Date: 2017-07-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.6\nCWE Name: Information Exposure\nSummary: an information disclosure vulnerability in the qualcomm wi-fi driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-32074353. references: qc-cr#1104731.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-04-07\nLast Modified Date: 2017-07-11",
"role": "assistant"
}
] |
CWE Code: 287
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Improper Authentication
Summary: a vulnerability in the authentication module of cisco identity services engine (ise) could allow an unauthenticated, remote attacker to bypass local authentication. the vulnerability is due to improper handling of authentication requests and policy assignment for externally authenticated users. an attacker could exploit this vulnerability by authenticating with a valid external user account that matches an internal username and incorrectly receiving the authorization policy of the internal account. an exploit could allow the attacker to have super admin privileges for the ise admin portal. this vulnerability does not affect endpoints authenticating to the ise. the vulnerability affects cisco ise, cisco ise express, and cisco ise virtual appliance running release 1.3, 1.4, 2.0.0, 2.0.1, or 2.1.0. release 2.2.x is not affected. cisco bug ids: cscvb10995.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-08-07
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Authentication.",
"role": "user"
},
{
"content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Improper Authentication\nSummary: a vulnerability in the authentication module of cisco identity services engine (ise) could allow an unauthenticated, remote attacker to bypass local authentication. the vulnerability is due to improper handling of authentication requests and policy assignment for externally authenticated users. an attacker could exploit this vulnerability by authenticating with a valid external user account that matches an internal username and incorrectly receiving the authorization policy of the internal account. an exploit could allow the attacker to have super admin privileges for the ise admin portal. this vulnerability does not affect endpoints authenticating to the ise. the vulnerability affects cisco ise, cisco ise express, and cisco ise virtual appliance running release 1.3, 1.4, 2.0.0, 2.0.1, or 2.1.0. release 2.2.x is not affected. cisco bug ids: cscvb10995.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-08-07\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in v3 chat - profiles/dating script 3.0.2 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-12-31
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in v3 chat - profiles/dating script 3.0.2 allows remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-31\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Out-of-bounds Read
Summary: in wpa_supplicant_8, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-122465453
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-27
Last Modified Date: 2019-10-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Out-of-bounds Read\nSummary: in wpa_supplicant_8, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-122465453\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-01",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in stash 1.0.3 allow remote attackers to execute arbitrary sql commands via (1) the username parameter to admin/login.php and (2) the post parameter to admin/news.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-16
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in stash 1.0.3 allow remote attackers to execute arbitrary sql commands via (1) the username parameter to admin/login.php and (2) the post parameter to admin/news.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-16\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in x/login in junglescripts ajax short url script allows remote attackers to execute arbitrary sql commands via the username parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-03-18
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in x/login in junglescripts ajax short url script allows remote attackers to execute arbitrary sql commands via the username parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-18\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Input Validation
Summary: vulnerability in the mysql connectors component of oracle mysql (subcomponent: connector/j). supported versions that are affected are 8.0.15 and prior. difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where mysql connectors executes to compromise mysql connectors. successful attacks require human interaction from a person other than the attacker. successful attacks of this vulnerability can result in takeover of mysql connectors. cvss 3.0 base score 6.3 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:h/pr:h/ui:r/s:u/c:h/i:h/a:h).
Access Authentication: SINGLE
Access Complexity: HIGH
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-04-23
Last Modified Date: 2019-09-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Input Validation\nSummary: vulnerability in the mysql connectors component of oracle mysql (subcomponent: connector/j). supported versions that are affected are 8.0.15 and prior. difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where mysql connectors executes to compromise mysql connectors. successful attacks require human interaction from a person other than the attacker. successful attacks of this vulnerability can result in takeover of mysql connectors. cvss 3.0 base score 6.3 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:h/pr:h/ui:r/s:u/c:h/i:h/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: HIGH\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-04-23\nLast Modified Date: 2019-09-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in the kemas antonius com_quran 1.1 and earlier component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the surano parameter in a viewayat action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-02-20
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the kemas antonius com_quran 1.1 and earlier component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the surano parameter in a viewayat action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-20\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the usb mass storage class driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows physically proximate attackers to execute arbitrary code by inserting a crafted usb device, aka "usb mass storage elevation of privilege vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-03-09
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the usb mass storage class driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows physically proximate attackers to execute arbitrary code by inserting a crafted usb device, aka \"usb mass storage elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-03-09\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: buffer overflow in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 gold, sp2, and r2, and windows 7 allows local users to gain privileges via vectors related to improper memory allocation for copies from user mode, aka "win32k buffer overflow vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-12-16
Last Modified Date: 2019-02-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 gold, sp2, and r2, and windows 7 allows local users to gain privileges via vectors related to improper memory allocation for copies from user mode, aka \"win32k buffer overflow vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-12-16\nLast Modified Date: 2019-02-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: nearbuy clone script 3.2 has sql injection via the category_list.php search parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-13
Last Modified Date: 2017-12-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: nearbuy clone script 3.2 has sql injection via the category_list.php search parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-13\nLast Modified Date: 2017-12-22",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in api/ice_media.cfc in lingxia i.c.e cms 1.0 allows remote attackers to execute arbitrary sql commands via the session.user_id parameter to media.cfm.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-02-21
Last Modified Date: 2018-08-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in api/ice_media.cfc in lingxia i.c.e cms 1.0 allows remote attackers to execute arbitrary sql commands via the session.user_id parameter to media.cfm.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-02-21\nLast Modified Date: 2018-08-13",
"role": "assistant"
}
] |
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Untrusted Search Path
Summary: ibm db2 for linux, unix and windows (includes db2 connect server) 9.7, 10.1, 10.5 and 11.1 binaries load shared libraries from an untrusted path potentially giving low privilege users full access to the db2 instance account by loading a malicious shared library. ibm x-force id: 140972.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-07-10
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Untrusted Search Path\nSummary: ibm db2 for linux, unix and windows (includes db2 connect server) 9.7, 10.1, 10.5 and 11.1 binaries load shared libraries from an untrusted path potentially giving low privilege users full access to the db2 instance account by loading a malicious shared library. ibm x-force id: 140972.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-07-10\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Information Exposure
Summary: in jenkins before versions 2.44, 2.32.2 node monitor data could be viewed by low privilege users via the remote api. these included system configuration and runtime information of these nodes (security-343).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2018-05-15
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: in jenkins before versions 2.44, 2.32.2 node monitor data could be viewed by low privilege users via the remote api. these included system configuration and runtime information of these nodes (security-343).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-05-15\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 476
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: NULL Pointer Dereference
Summary: all versions of the nvidia windows gpu display driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler where a null pointer dereference may lead to denial of service or potential escalation of privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-05-09
Last Modified Date: 2017-05-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: NULL Pointer Dereference.",
"role": "user"
},
{
"content": "CWE Code: 476\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: NULL Pointer Dereference\nSummary: all versions of the nvidia windows gpu display driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler where a null pointer dereference may lead to denial of service or potential escalation of privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-05-09\nLast Modified Date: 2017-05-17",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: win32k.sys in the kernel-mode drivers in microsoft windows server 2003 sp2 and r2 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012, and windows rt allows local users to gain privileges via a crafted application, aka "win32k elevation of privilege vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-07-14
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: win32k.sys in the kernel-mode drivers in microsoft windows server 2003 sp2 and r2 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows 8.1, windows server 2012, and windows rt allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-07-14\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: microsoft windows server 2003 sp2 allows local users to gain privileges via a crafted ioctl call to (1) tcpip.sys or (2) tcpip6.sys, aka "tcp/ip elevation of privilege vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-11-11
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: microsoft windows server 2003 sp2 allows local users to gain privileges via a crafted ioctl call to (1) tcpip.sys or (2) tcpip6.sys, aka \"tcp/ip elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-11-11\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: sql_injection
CVSS Score: 4.3
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: multiple cross-site scripting (xss) vulnerabilities in mysql lite administrator (mysql-lite-administrator) beta-1 allow remote attackers to inject arbitrary web script or html via the table_name parameter to (1) tabella.php, (2) coloni.php, or (3) insert.php or (4) num_row parameter to coloni.php.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2015-06-24
Last Modified Date: 2018-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: sql_injection\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: multiple cross-site scripting (xss) vulnerabilities in mysql lite administrator (mysql-lite-administrator) beta-1 allow remote attackers to inject arbitrary web script or html via the table_name parameter to (1) tabella.php, (2) coloni.php, or (3) insert.php or (4) num_row parameter to coloni.php.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2015-06-24\nLast Modified Date: 2018-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection exists in the timetable responsive schedule 1.5 component for joomla! via a view=event&alias= request.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-02-17
Last Modified Date: 2018-03-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in the timetable responsive schedule 1.5 component for joomla! via a view=event&alias= request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-02-17\nLast Modified Date: 2018-03-05",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the myannonces module for e-xoopport 3.1 allows remote attackers to execute arbitrary sql commands via the lid parameter in a viewannonces action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-07-24
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the myannonces module for e-xoopport 3.1 allows remote attackers to execute arbitrary sql commands via the lid parameter in a viewannonces action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-07-24\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: in addlinks of linkify.java, there is a possible phishing vector due to an unusual root cause. this could lead to remote code execution or misdirection of clicks with no additional execution privileges needed. user interaction is needed for exploitation.product: androidversions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9android id: a-116321860
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-06-19
Last Modified Date: 2019-06-20 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: in addlinks of linkify.java, there is a possible phishing vector due to an unusual root cause. this could lead to remote code execution or misdirection of clicks with no additional execution privileges needed. user interaction is needed for exploitation.product: androidversions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9android id: a-116321860\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-19\nLast Modified Date: 2019-06-20",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in index.php in bloo 1.00 and earlier allow remote attackers to execute arbitrary sql commands via the (1) post_id, (2) post_category_id, (3) post_year_month, and (4) static_page_id parameters; and unspecified other vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-03-12
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in bloo 1.00 and earlier allow remote attackers to execute arbitrary sql commands via the (1) post_id, (2) post_category_id, (3) post_year_month, and (4) static_page_id parameters; and unspecified other vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-03-12\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 275
Vulnerability Type: privilege_escalation
CVSS Score: 5.5
CWE Name: Permission Issues
Summary: it was discovered that in the ovirt's rest api before version 4.3.2.1, removediskcommand is triggered as an internal command, meaning the permission validation that should be performed against the calling user is skipped. a user with low privileges (eg basic operations) could exploit this flaw to delete disks attached to guests.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/PARTIAL
Published Date: 2019-03-25
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permission Issues.",
"role": "user"
},
{
"content": "CWE Code: 275\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Permission Issues\nSummary: it was discovered that in the ovirt's rest api before version 4.3.2.1, removediskcommand is triggered as an internal command, meaning the permission validation that should be performed against the calling user is skipped. a user with low privileges (eg basic operations) could exploit this flaw to delete disks attached to guests.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/PARTIAL\nPublished Date: 2019-03-25\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in rss.php in zenphoto 1.1 through 1.1.3 allows remote attackers to execute arbitrary sql commands via the albumnr parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-01-04
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in rss.php in zenphoto 1.1 through 1.1.3 allows remote attackers to execute arbitrary sql commands via the albumnr parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-01-04\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the phoca documentation (com_phocadocumentation) component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a section action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-23
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the phoca documentation (com_phocadocumentation) component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a section action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-23\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in eurologon cms allow remote attackers to execute arbitrary sql commands via the id parameter to (1) reviews.php, (2) links.php and (3) articles.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-11-29
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in eurologon cms allow remote attackers to execute arbitrary sql commands via the id parameter to (1) reviews.php, (2) links.php and (3) articles.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-11-29\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Access Control
Summary: vulnerability in the primavera p6 enterprise project portfolio management component of oracle construction and engineering suite (subcomponent: web access). the supported version that is affected is 18.8. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise primavera p6 enterprise project portfolio management. successful attacks of this vulnerability can result in unauthorized read access to a subset of primavera p6 enterprise project portfolio management accessible data. cvss 3.0 base score 4.3 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:n).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-04-23
Last Modified Date: 2019-04-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Access Control\nSummary: vulnerability in the primavera p6 enterprise project portfolio management component of oracle construction and engineering suite (subcomponent: web access). the supported version that is affected is 18.8. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise primavera p6 enterprise project portfolio management. successful attacks of this vulnerability can result in unauthorized read access to a subset of primavera p6 enterprise project portfolio management accessible data. cvss 3.0 base score 4.3 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-04-23\nLast Modified Date: 2019-04-25",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: dell/alienware digital delivery versions prior to 3.5.2013 contain a privilege escalation vulnerability. a local non-privileged malicious user could exploit a named pipe that performs binary deserialization via a process hollowing technique to inject malicous code to run an executable with elevated privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-08-09
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: dell/alienware digital delivery versions prior to 3.5.2013 contain a privilege escalation vulnerability. a local non-privileged malicious user could exploit a named pipe that performs binary deserialization via a process hollowing technique to inject malicous code to run an executable with elevated privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-08-09\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in main/main.php in questcms allows remote attackers to execute arbitrary sql commands via the obj parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-28
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in main/main.php in questcms allows remote attackers to execute arbitrary sql commands via the obj parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-28\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in search.php in mh products kleinanzeigenmarkt allows remote attackers to execute arbitrary sql commands via the c parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-11-23
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in search.php in mh products kleinanzeigenmarkt allows remote attackers to execute arbitrary sql commands via the c parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-23\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in shop/mainfile.php in 123tkshop 0.9.1 allows remote attackers to execute arbitrary sql commands via a base64-encoded value of the admin parameter to shop/admin.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-12-20
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in shop/mainfile.php in 123tkshop 0.9.1 allows remote attackers to execute arbitrary sql commands via a base64-encoded value of the admin parameter to shop/admin.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-12-20\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in smartblog (aka smblog) 1.3 allow remote attackers to execute arbitrary sql commands via the (1) mois, (2) an, (3) jour, and (4) id parameters to index.php, and the (5) login parameter to gestion/logon.php, different vectors than cve-2008-2183. note: the provenance of this information is unknown; the details are obtained solely from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-05-13
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in smartblog (aka smblog) 1.3 allow remote attackers to execute arbitrary sql commands via the (1) mois, (2) an, (3) jour, and (4) id parameters to index.php, and the (5) login parameter to gestion/logon.php, different vectors than cve-2008-2183. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-13\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Out-of-bounds Write
Summary: in bluetooth, there is a possible out of bounds write due to an integer overflow. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-113572342
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-09-27
Last Modified Date: 2019-10-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Out-of-bounds Write\nSummary: in bluetooth, there is a possible out of bounds write due to an integer overflow. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-113572342\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-02",
"role": "assistant"
}
] |
CWE Code: 732
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Incorrect Permission Assignment for Critical Resource
Summary: the standardrestorer binary in arq 5.10 and earlier for mac allows local users to write to arbitrary files and consequently gain root privileges via a crafted restore path.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-01-31
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.",
"role": "user"
},
{
"content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: the standardrestorer binary in arq 5.10 and earlier for mac allows local users to write to arbitrary files and consequently gain root privileges via a crafted restore path.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-01-31\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in imgallery 2.5, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) kategoria parameter to (a) galeria.php and the (2) id_phot parameter to (b) popup/koment.php and (c) popup/opis.php in, different vectors than cve-2006-3163.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-05-19
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in imgallery 2.5, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary sql commands via the (1) kategoria parameter to (a) galeria.php and the (2) id_phot parameter to (b) popup/koment.php and (c) popup/opis.php in, different vectors than cve-2006-3163.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-19\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Information Exposure
Summary: vulnerability in the oracle flexcube direct banking product of oracle financial services applications (component: email). supported versions that are affected are 12.0.2 and 12.0.3. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle flexcube direct banking. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle flexcube direct banking accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/NONE/NONE
Published Date: 2019-10-16
Last Modified Date: 2019-10-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Information Exposure\nSummary: vulnerability in the oracle flexcube direct banking product of oracle financial services applications (component: email). supported versions that are affected are 12.0.2 and 12.0.3. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle flexcube direct banking. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle flexcube direct banking accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/NONE/NONE\nPublished Date: 2019-10-16\nLast Modified Date: 2019-10-21",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: hidea.com az admin 1.0 has news_det.php?cod= sql injection.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-07-11
Last Modified Date: 2019-07-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: hidea.com az admin 1.0 has news_det.php?cod= sql injection.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-11\nLast Modified Date: 2019-07-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in eshtery cms (aka eshtery.com) allow remote attackers to execute arbitrary sql commands via the (1) criteria field in an unspecified form related to catlgsearch.aspx or (2) user name to an unspecified form related to adminlogin.aspx.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-09-16
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in eshtery cms (aka eshtery.com) allow remote attackers to execute arbitrary sql commands via the (1) criteria field in an unspecified form related to catlgsearch.aspx or (2) user name to an unspecified form related to adminlogin.aspx.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-09-16\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 5.0
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: auo sunveillance monitoring system before v1.1.9e is vulnerable to mvc_send_mail.aspx (mailadd parameter) sql injection. an attacker can carry a sql injection payload to the server, allowing the attacker to read privileged data. this also affects the picture_manage_mvc.aspx plant_no parameter, the swapdl_mvc.aspx plant_no parameter, and the account_management.aspx text_postal_code and text_dis_code parameters.
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-12
Last Modified Date: 2019-11-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: auo sunveillance monitoring system before v1.1.9e is vulnerable to mvc_send_mail.aspx (mailadd parameter) sql injection. an attacker can carry a sql injection payload to the server, allowing the attacker to read privileged data. this also affects the picture_manage_mvc.aspx plant_no parameter, the swapdl_mvc.aspx plant_no parameter, and the account_management.aspx text_postal_code and text_dis_code parameters.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-12\nLast Modified Date: 2019-11-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in show.php in fascript famp3 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-01-17
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in show.php in fascript famp3 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-01-17\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 189
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Numeric Errors
Summary: integer underflow in the dns_name_fromtext function in (1) libdns_nonsecure.a and (2) libdns_secure.a in ibm aix 5.2 allows local users to gain privileges via a crafted "-y" (tsig key) command line argument to dig.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2007-11-05
Last Modified Date: 2017-07-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Numeric Errors.",
"role": "user"
},
{
"content": "CWE Code: 189\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Numeric Errors\nSummary: integer underflow in the dns_name_fromtext function in (1) libdns_nonsecure.a and (2) libdns_secure.a in ibm aix 5.2 allows local users to gain privileges via a crafted \"-y\" (tsig key) command line argument to dig.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2007-11-05\nLast Modified Date: 2017-07-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: an elevation of privilege vulnerability exists when windows appx deployment service (appxsvc) improperly handles hard links, aka 'windows elevation of privilege vulnerability'.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-06-12
Last Modified Date: 2019-06-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability exists when windows appx deployment service (appxsvc) improperly handles hard links, aka 'windows elevation of privilege vulnerability'.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-12\nLast Modified Date: 2019-06-14",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Out-of-bounds Write
Summary: in rw_t2t_handle_tlv_detect_rsp of rw_t2t_ndef.cc, there is a possible out-of-bound write due to a missing bounds check. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is needed for exploitation.product: androidversions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9android id: a-121035711
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-06-19
Last Modified Date: 2019-06-20 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Out-of-bounds Write\nSummary: in rw_t2t_handle_tlv_detect_rsp of rw_t2t_ndef.cc, there is a possible out-of-bound write due to a missing bounds check. this could lead to local escalation of privilege with no additional execution privileges needed. user interaction is needed for exploitation.product: androidversions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9android id: a-121035711\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-19\nLast Modified Date: 2019-06-20",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: emc avamar client 4.x, 5.x, and 6.x on hp-ux and mac os x, and the emc avamar plugin 4.x, 5.x, and 6.x for oracle, uses world-writable permissions for cache directories, which allows local users to gain privileges via an unspecified symlink attack.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-01-21
Last Modified Date: 2013-01-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: emc avamar client 4.x, 5.x, and 6.x on hp-ux and mac os x, and the emc avamar plugin 4.x, 5.x, and 6.x for oracle, uses world-writable permissions for cache directories, which allows local users to gain privileges via an unspecified symlink attack.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-01-21\nLast Modified Date: 2013-01-22",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Improper Access Control
Summary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.32 and prior to 6.0.10. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of oracle vm virtualbox. cvss 3.0 base score 5.5 (availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:n/i:n/a:h).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-07-23
Last Modified Date: 2019-07-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.32 and prior to 6.0.10. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of oracle vm virtualbox. cvss 3.0 base score 5.5 (availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-07-23\nLast Modified Date: 2019-07-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in joomla! 3.7.x before 3.7.1 allows attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-05-17
Last Modified Date: 2019-04-16 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in joomla! 3.7.x before 3.7.1 allows attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-05-17\nLast Modified Date: 2019-04-16",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: udf in apple os x before 10.10.5 allows local users to gain privileges or cause a denial of service (memory corruption and application crash) via a malformed dmg image.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-08-16
Last Modified Date: 2017-09-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: udf in apple os x before 10.10.5 allows local users to gain privileges or cause a denial of service (memory corruption and application crash) via a malformed dmg image.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-08-16\nLast Modified Date: 2017-09-21",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in admin.php in churchcms 0.0.1 allow remote attackers to execute arbitrary sql commands via the (1) uname or (2) pass parameters in a login action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2013-01-24
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in admin.php in churchcms 0.0.1 allow remote attackers to execute arbitrary sql commands via the (1) uname or (2) pass parameters in a login action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-01-24\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 275
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permission Issues
Summary: multiple zoho manageengine products suffer from local privilege escalation due to improper permissions for the %systemdrive%\manageengine directory and its sub-folders. moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. this will effectively allow non-privileged users to escalate privileges to nt authority\system. this affects desktop central 10.0.380, eventlog analyzer 12.0.2, servicedesk plus 10.0.0, supportcenter plus 8.1, o365 manager plus 4.0, mobile device manager plus 9.0.0, patch connect plus 9.0.0, vulnerability manager plus 9.0.0, patch manager plus 9.0.0, opmanager 12.3, netflow analyzer 11.0, oputils 11.0, network configuration manager 11.0, firewall 12.0, key manager plus 5.6, password manager pro 9.9, analytics plus 1.0, and browser security plus.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-06-18
Last Modified Date: 2019-06-20 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permission Issues.",
"role": "user"
},
{
"content": "CWE Code: 275\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permission Issues\nSummary: multiple zoho manageengine products suffer from local privilege escalation due to improper permissions for the %systemdrive%\\manageengine directory and its sub-folders. moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. this will effectively allow non-privileged users to escalate privileges to nt authority\\system. this affects desktop central 10.0.380, eventlog analyzer 12.0.2, servicedesk plus 10.0.0, supportcenter plus 8.1, o365 manager plus 4.0, mobile device manager plus 9.0.0, patch connect plus 9.0.0, vulnerability manager plus 9.0.0, patch manager plus 9.0.0, opmanager 12.3, netflow analyzer 11.0, oputils 11.0, network configuration manager 11.0, firewall 12.0, key manager plus 5.6, password manager pro 9.9, analytics plus 1.0, and browser security plus.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-18\nLast Modified Date: 2019-06-20",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: the bluetooth hci interface implementation in apple os x before 10.10.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-07-03
Last Modified Date: 2017-09-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the bluetooth hci interface implementation in apple os x before 10.10.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-07-03\nLast Modified Date: 2017-09-22",
"role": "assistant"
}
] |
CWE Code: 78
Vulnerability Type: sql_injection
CVSS Score: 10.0
CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary: in the mmm::agent::helpers::network::add_ip function in mysql multi-master replication manager (mmm) mmm_agentd 2.2.1 (for freebsd), a specially crafted mmm protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. an attacker that can initiate a tcp session with mmm\_agentd can trigger this vulnerability.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-05-09
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 78\nVulnerability Type: sql_injection\nCVSS Score: 10.0\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: in the mmm::agent::helpers::network::add_ip function in mysql multi-master replication manager (mmm) mmm_agentd 2.2.1 (for freebsd), a specially crafted mmm protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\\_agentd process. an attacker that can initiate a tcp session with mmm\\_agentd can trigger this vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-05-09\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 5.5
CWE Name: Improper Access Control
Summary: vulnerability in the oracle weblogic server component of oracle fusion middleware (subcomponent: wls - web services). the supported version that is affected is 10.3.6.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle weblogic server. successful attacks of this vulnerability can result in unauthorized read access to a subset of oracle weblogic server accessible data and unauthorized ability to cause a partial denial of service (partial dos) of oracle weblogic server. cvss 3.0 base score 5.4 (confidentiality and availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:l).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/PARTIAL
Published Date: 2019-01-16
Last Modified Date: 2019-01-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle weblogic server component of oracle fusion middleware (subcomponent: wls - web services). the supported version that is affected is 10.3.6.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle weblogic server. successful attacks of this vulnerability can result in unauthorized read access to a subset of oracle weblogic server accessible data and unauthorized ability to cause a partial denial of service (partial dos) of oracle weblogic server. cvss 3.0 base score 5.4 (confidentiality and availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:l).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/PARTIAL\nPublished Date: 2019-01-16\nLast Modified Date: 2019-01-19",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Information Exposure
Summary: vulnerability in the peoplesoft enterprise pt peopletools component of oracle peoplesoft products (subcomponent: pagelet wizard). supported versions that are affected are 8.55, 8.56 and 8.57. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise peoplesoft enterprise pt peopletools. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all peoplesoft enterprise pt peopletools accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-07-23
Last Modified Date: 2019-07-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: vulnerability in the peoplesoft enterprise pt peopletools component of oracle peoplesoft products (subcomponent: pagelet wizard). supported versions that are affected are 8.55, 8.56 and 8.57. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise peoplesoft enterprise pt peopletools. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all peoplesoft enterprise pt peopletools accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-07-23\nLast Modified Date: 2019-07-25",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in liretopic.php in xforum 1.4 and possibly others allows remote attackers to execute arbitrary sql commands via the topic parameter. note: the categorie parameter might also be affected.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-01-15
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in liretopic.php in xforum 1.4 and possibly others allows remote attackers to execute arbitrary sql commands via the topic parameter. note: the categorie parameter might also be affected.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-01-15\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 4.9
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: race condition in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2, r2, and r2 sp1, and windows 7 gold and sp1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other cves listed in ms13-016.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/NONE/NONE
Published Date: 2013-02-13
Last Modified Date: 2019-02-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: race condition in win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2, r2, and r2 sp1, and windows 7 gold and sp1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other cves listed in ms13-016.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/NONE/NONE\nPublished Date: 2013-02-13\nLast Modified Date: 2019-02-26",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Out-of-bounds Read
Summary: in bluetooth, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-112050983
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-27
Last Modified Date: 2019-09-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Out-of-bounds Read\nSummary: in bluetooth, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-112050983\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Input Validation
Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: replication). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-04-23
Last Modified Date: 2019-08-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Input Validation\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: replication). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-04-23\nLast Modified Date: 2019-08-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in administration/profiles.php in boonex dolphin 7.1.4 and earlier allows remote authenticated administrators to execute arbitrary sql commands via the members[] parameter. note: this can be exploited by remote attackers by leveraging cve-2014-4333.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-06-19
Last Modified Date: 2018-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in administration/profiles.php in boonex dolphin 7.1.4 and earlier allows remote authenticated administrators to execute arbitrary sql commands via the members[] parameter. note: this can be exploited by remote attackers by leveraging cve-2014-4333.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-06-19\nLast Modified Date: 2018-10-09",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Improper Input Validation
Summary: ethanalyzer in the fabric-interconnect component in cisco unified computing system (ucs) allows local users to gain privileges by embedding commands in an unspecified parameter, aka bug id csctq02686.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-10-02
Last Modified Date: 2017-02-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Input Validation\nSummary: ethanalyzer in the fabric-interconnect component in cisco unified computing system (ucs) allows local users to gain privileges by embedding commands in an unspecified parameter, aka bug id csctq02686.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-10-02\nLast Modified Date: 2017-02-19",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Input Validation
Summary: appleraid in apple os x before 10.11.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-03-24
Last Modified Date: 2016-12-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Input Validation\nSummary: appleraid in apple os x before 10.11.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-03-24\nLast Modified Date: 2016-12-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the turtushout component 0.11 for joomla! allows remote attackers to execute arbitrary sql commands via the name field.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-09-24
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the turtushout component 0.11 for joomla! allows remote attackers to execute arbitrary sql commands via the name field.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-09-24\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: in easelcomm_hw_build_scatterlist, there is a possible out of bounds write due to a race condition. this could lead to local escalation of privilege with system privileges required. user interaction is not needed for exploitation. product: android. versions: android kernel. android id: a-69808833.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-12-07
Last Modified Date: 2019-01-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: in easelcomm_hw_build_scatterlist, there is a possible out of bounds write due to a race condition. this could lead to local escalation of privilege with system privileges required. user interaction is not needed for exploitation. product: android. versions: android kernel. android id: a-69808833.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-12-07\nLast Modified Date: 2019-01-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in search.php in ecshop 2.7.2 allows remote attackers to execute arbitrary sql commands via the encode parameter. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-05-25
Last Modified Date: 2010-05-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in search.php in ecshop 2.7.2 allows remote attackers to execute arbitrary sql commands via the encode parameter. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-05-25\nLast Modified Date: 2010-05-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in default.asp in openasp 3.0 and earlier allows remote attackers to execute arbitrary sql commands via the idpage parameter in the pages module.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-24
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in default.asp in openasp 3.0 and earlier allows remote attackers to execute arbitrary sql commands via the idpage parameter in the pages module.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-24\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in plume cms 1.2.3 allow (1) remote authenticated users to execute arbitrary sql commands via the m parameter to manager/index.php and (2) remote authenticated administrators to execute arbitrary sql commands via the id parameter in an edit_link action to manager/tools.php. note: some of these details are obtained from third party information.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-09-25
Last Modified Date: 2011-11-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in plume cms 1.2.3 allow (1) remote authenticated users to execute arbitrary sql commands via the m parameter to manager/index.php and (2) remote authenticated administrators to execute arbitrary sql commands via the id parameter in an edit_link action to manager/tools.php. note: some of these details are obtained from third party information.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-09-25\nLast Modified Date: 2011-11-10",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Improper Input Validation
Summary: in lenovo xclarity administrator versions earlier than 2.1.0, an authenticated lxca user can, under specific circumstances, inject additional parameters into a specific web api call which can result in privileged command execution within lxca's underlying operating system.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-07-30
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Input Validation\nSummary: in lenovo xclarity administrator versions earlier than 2.1.0, an authenticated lxca user can, under specific circumstances, inject additional parameters into a specific web api call which can result in privileged command execution within lxca's underlying operating system.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-07-30\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Out-of-bounds Write
Summary: in android before the 2018-06-05 security patch level, nvidia tegra x1 tz contains a possible out of bounds write due to missing bounds check which could lead to escalation of privilege from the kernel to the tz. user interaction is not needed for exploitation. this issue is rated as high. version: n/a. android: a-69316825. reference: n-cve-2017-6294.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-06-07
Last Modified Date: 2018-07-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Out-of-bounds Write\nSummary: in android before the 2018-06-05 security patch level, nvidia tegra x1 tz contains a possible out of bounds write due to missing bounds check which could lead to escalation of privilege from the kernel to the tz. user interaction is not needed for exploitation. this issue is rated as high. version: n/a. android: a-69316825. reference: n-cve-2017-6294.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-06-07\nLast Modified Date: 2018-07-27",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the news module in envolution allows remote attackers to execute arbitrary sql commands via the (1) startrow and (2) catid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2005-12-15
Last Modified Date: 2011-03-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the news module in envolution allows remote attackers to execute arbitrary sql commands via the (1) startrow and (2) catid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2005-12-15\nLast Modified Date: 2011-03-07",
"role": "assistant"
}
] |
CWE Code: 16
Vulnerability Type: privilege_escalation
CVSS Score: 4.9
CWE Name: Configuration
Summary: the apache http server 2.2.11 and earlier 2.2 versions does not properly handle options=includesnoexec in the allowoverride directive, which allows local users to gain privileges by configuring (1) options includes, (2) options +includes, or (3) options +includesnoexec in a .htaccess file, and then inserting an exec element in a .shtml file.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2009-05-28
Last Modified Date: 2018-10-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Configuration.",
"role": "user"
},
{
"content": "CWE Code: 16\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Configuration\nSummary: the apache http server 2.2.11 and earlier 2.2 versions does not properly handle options=includesnoexec in the allowoverride directive, which allows local users to gain privileges by configuring (1) options includes, (2) options +includes, or (3) options +includesnoexec in a .htaccess file, and then inserting an exec element in a .shtml file.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2009-05-28\nLast Modified Date: 2018-10-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the web framework in cisco prime collaboration assurance 10.5(1) allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscus39887.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-10-12
Last Modified Date: 2016-12-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the web framework in cisco prime collaboration assurance 10.5(1) allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscus39887.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-10-12\nLast Modified Date: 2016-12-09",
"role": "assistant"
}
] |
CWE Code: 59
Vulnerability Type: privilege_escalation
CVSS Score: 6.6
CWE Name: Improper Link Resolution Before File Access ('Link Following')
Summary: deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the bootdoctor::fix() function to download an iso file, and follows symlinks there. an unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. the content is not attacker controlled. by winning a race condition to replace the /tmp/repo.iso symlink by an attacker controlled iso file, further privilege escalation may be possible.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/COMPLETE/COMPLETE
Published Date: 2019-07-04
Last Modified Date: 2019-07-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Link Resolution Before File Access ('Link Following').",
"role": "user"
},
{
"content": "CWE Code: 59\nVulnerability Type: privilege_escalation\nCVSS Score: 6.6\nCWE Name: Improper Link Resolution Before File Access ('Link Following')\nSummary: deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the bootdoctor::fix() function to download an iso file, and follows symlinks there. an unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. the content is not attacker controlled. by winning a race condition to replace the /tmp/repo.iso symlink by an attacker controlled iso file, further privilege escalation may be possible.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/COMPLETE/COMPLETE\nPublished Date: 2019-07-04\nLast Modified Date: 2019-07-28",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Permissions Privileges and Access Controls
Summary: the mc_issue_note_update function in the soap api in mantisbt before 1.2.11 does not properly check privileges, which allows remote attackers with bug reporting privileges to edit arbitrary bugnotes via a soap request.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-06-17
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: the mc_issue_note_update function in the soap api in mantisbt before 1.2.11 does not properly check privileges, which allows remote attackers with bug reporting privileges to edit arbitrary bugnotes via a soap request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-06-17\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the photo-edit subsystem in piwigo 2.6.x and 2.7.x before 2.7.0beta2 allows remote authenticated administrators to execute arbitrary sql commands via the associate[] field.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-06-28
Last Modified Date: 2014-06-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the photo-edit subsystem in piwigo 2.6.x and 2.7.x before 2.7.0beta2 allows remote authenticated administrators to execute arbitrary sql commands via the associate[] field.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-06-28\nLast Modified Date: 2014-06-30",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in cms-brd allows remote attackers to execute arbitrary sql commands via the menuclick parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-06-24
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in cms-brd allows remote attackers to execute arbitrary sql commands via the menuclick parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-24\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.