text
stringlengths 365
3.97k
| conversations
listlengths 3
3
|
---|---|
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: basic b2b script 2.0.8 has sql injection via the product_details.php id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-13
Last Modified Date: 2017-12-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: basic b2b script 2.0.8 has sql injection via the product_details.php id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-13\nLast Modified Date: 2017-12-22",
"role": "assistant"
}
] |
CWE Code: 190
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Integer Overflow or Wraparound
Summary: an elevation of privilege vulnerability exists due to an integer overflow in windows subsystem for linux, aka "windows subsystem for linux elevation of privilege vulnerability." this affects windows 10, windows 10 servers.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-09-13
Last Modified Date: 2018-11-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.",
"role": "user"
},
{
"content": "CWE Code: 190\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Integer Overflow or Wraparound\nSummary: an elevation of privilege vulnerability exists due to an integer overflow in windows subsystem for linux, aka \"windows subsystem for linux elevation of privilege vulnerability.\" this affects windows 10, windows 10 servers.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-09-13\nLast Modified Date: 2018-11-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the views module before 6.x-2.13 for drupal allows remote attackers to execute arbitrary sql commands via vectors related to "filters/arguments on certain types of views with specific configurations of arguments."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-02-17
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the views module before 6.x-2.13 for drupal allows remote attackers to execute arbitrary sql commands via vectors related to \"filters/arguments on certain types of views with specific configurations of arguments.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-02-17\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.4
CWE Name: Permissions Privileges and Access Controls
Summary: sudo 1.6.x before 1.6.9p21, when the runas_default option is used, does not properly set group memberships, which allows local users to gain privileges via a sudo command.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-02-25
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Permissions Privileges and Access Controls\nSummary: sudo 1.6.x before 1.6.9p21, when the runas_default option is used, does not properly set group memberships, which allows local users to gain privileges via a sudo command.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-02-25\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Permissions Privileges and Access Controls
Summary: unspecified vulnerability in the java administration gui (jnbsa) in symantec veritas netbackup server and netbackup enterprise server 5.1 before mp7, 6.0 before mp7, and 6.5 before 6.5.2 allows remote authenticated users to gain privileges via unknown attack vectors related to "bpjava* binaries."
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-09-30
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: unspecified vulnerability in the java administration gui (jnbsa) in symantec veritas netbackup server and netbackup enterprise server 5.1 before mp7, 6.0 before mp7, and 6.5 before 6.5.2 allows remote authenticated users to gain privileges via unknown attack vectors related to \"bpjava* binaries.\"\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-09-30\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection exists in the social factory 3.8.3 component for joomla! via the radius[lat], radius[lng], or radius[radius] parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-09-28
Last Modified Date: 2018-11-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in the social factory 3.8.3 component for joomla! via the radius[lat], radius[lng], or radius[radius] parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-09-28\nLast Modified Date: 2018-11-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in gespage before 7.4.9 allow remote attackers to execute arbitrary sql commands via the (1) show_prn parameter to webapp/users/prnow.jsp or show_month parameter to (2) webapp/users/blhistory.jsp or (3) webapp/users/prhistory.jsp.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-01-08
Last Modified Date: 2018-02-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in gespage before 7.4.9 allow remote attackers to execute arbitrary sql commands via the (1) show_prn parameter to webapp/users/prnow.jsp or show_month parameter to (2) webapp/users/blhistory.jsp or (3) webapp/users/prhistory.jsp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-01-08\nLast Modified Date: 2018-02-01",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the bp_find_jobs_with_program function module in sap netweaver j2ee engine 7.40 allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-09-18
Last Modified Date: 2018-12-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the bp_find_jobs_with_program function module in sap netweaver j2ee engine 7.40 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-09-18\nLast Modified Date: 2018-12-10",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Out-of-bounds Write
Summary: in the nfc_hci_cmd_received() function of core.c, there is a possible out of bounds write due to a missing bounds check. this could lead to local escalation of privilege in the kernel with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android kernel. android id: a-62679701.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-04-04
Last Modified Date: 2018-05-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Out-of-bounds Write\nSummary: in the nfc_hci_cmd_received() function of core.c, there is a possible out of bounds write due to a missing bounds check. this could lead to local escalation of privilege in the kernel with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android kernel. android id: a-62679701.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-04-04\nLast Modified Date: 2018-05-10",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Access Control
Summary: vulnerability in the oracle flexcube investor servicing component of oracle financial services applications (subcomponent: infrastructure). supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle flexcube investor servicing. successful attacks require human interaction from a person other than the attacker. successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial dos) of oracle flexcube investor servicing. cvss 3.0 base score 3.5 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:r/s:u/c:n/i:n/a:l).
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-07-23
Last Modified Date: 2019-07-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle flexcube investor servicing component of oracle financial services applications (subcomponent: infrastructure). supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle flexcube investor servicing. successful attacks require human interaction from a person other than the attacker. successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial dos) of oracle flexcube investor servicing. cvss 3.0 base score 3.5 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:r/s:u/c:n/i:n/a:l).\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-07-23\nLast Modified Date: 2019-07-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in phpcounter 1.3.2 and earlier allows remote attackers to execute arbitrary sql commands via the name parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-22
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in phpcounter 1.3.2 and earlier allows remote attackers to execute arbitrary sql commands via the name parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-22\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 6.4
CWE Name: Improper Input Validation
Summary: an issue was discovered in repute arforms 3.5.1 and prior. an attacker is able to delete any file on the server with web server privileges by sending a malicious request to admin-ajax.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/PARTIAL
Published Date: 2019-03-21
Last Modified Date: 2019-03-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.4\nCWE Name: Improper Input Validation\nSummary: an issue was discovered in repute arforms 3.5.1 and prior. an attacker is able to delete any file on the server with web server privileges by sending a malicious request to admin-ajax.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/PARTIAL\nPublished Date: 2019-03-21\nLast Modified Date: 2019-03-22",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Permissions Privileges and Access Controls
Summary: estsoft alupdate 8.5.1.0.0 uses weak permissions (users: full control) for the (1) alupdate folder and (2) alupdate.exe, which allows local users to gain privileges via a trojan horse file.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-11-03
Last Modified Date: 2017-09-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: estsoft alupdate 8.5.1.0.0 uses weak permissions (users: full control) for the (1) alupdate folder and (2) alupdate.exe, which allows local users to gain privileges via a trojan horse file.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-11-03\nLast Modified Date: 2017-09-08",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: insufficient input validation in heci subsystem in intel(r) csme before version 11.21.55, intel? server platform services before version 4.0 and intel? trusted execution engine firmware before version 3.1.55 may allow a privileged user to potentially enable escalation of privileges via local access.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-06-13
Last Modified Date: 2019-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: insufficient input validation in heci subsystem in intel(r) csme before version 11.21.55, intel? server platform services before version 4.0 and intel? trusted execution engine firmware before version 3.1.55 may allow a privileged user to potentially enable escalation of privileges via local access.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-13\nLast Modified Date: 2019-10-10",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Out-of-bounds Read
Summary: in bluetooth, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure in the bluetooth service with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-117567437
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-27
Last Modified Date: 2019-09-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Out-of-bounds Read\nSummary: in bluetooth, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure in the bluetooth service with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-117567437\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Permissions Privileges and Access Controls
Summary: unspecified vulnerability in everyblog 5.x and 6.x, a module for drupal, allows remote attackers to gain privileges as another user or an administrator via unknown attack vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-14
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: unspecified vulnerability in everyblog 5.x and 6.x, a module for drupal, allows remote attackers to gain privileges as another user or an administrator via unknown attack vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-14\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 190
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Integer Overflow or Wraparound
Summary: in freebsd before 11.1-stable, 11.1-release-p9, 10.4-stable, 10.4-release-p8 and 10.3-release-p28, insufficient validation of user-provided font parameters can result in an integer overflow, leading to the use of arbitrary kernel memory as glyph data. unprivileged users may be able to access privileged kernel data.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2018-04-04
Last Modified Date: 2018-05-24 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Integer Overflow or Wraparound.",
"role": "user"
},
{
"content": "CWE Code: 190\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Integer Overflow or Wraparound\nSummary: in freebsd before 11.1-stable, 11.1-release-p9, 10.4-stable, 10.4-release-p8 and 10.3-release-p28, insufficient validation of user-provided font parameters can result in an integer overflow, leading to the use of arbitrary kernel memory as glyph data. unprivileged users may be able to access privileged kernel data.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-04-04\nLast Modified Date: 2018-05-24",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: untrusted search path vulnerability in the microsoft foundation class (mfc) library in microsoft visual studio .net 2003 sp1; visual studio 2005 sp1, 2008 sp1, and 2010; visual c++ 2005 sp1, 2008 sp1, and 2010; and exchange server 2010 service pack 3, 2013, and 2013 allows local users to gain privileges via a trojan horse dwmapi.dll file in the current working directory during execution of an mfc application such as atltracetool8.exe (aka atl mfc trace tool), as demonstrated by a directory that contains a trc, cur, rs, rct, or res file, aka "mfc insecure library loading vulnerability." per: https://technet.microsoft.com/en-us/security/bulletin/ms11-025 access vector: network per "this is a remote code execution vulnerability" per: http://cwe.mitre.org/data/definitions/426.html
cwe-426: untrusted search path
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-08-31
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: untrusted search path vulnerability in the microsoft foundation class (mfc) library in microsoft visual studio .net 2003 sp1; visual studio 2005 sp1, 2008 sp1, and 2010; visual c++ 2005 sp1, 2008 sp1, and 2010; and exchange server 2010 service pack 3, 2013, and 2013 allows local users to gain privileges via a trojan horse dwmapi.dll file in the current working directory during execution of an mfc application such as atltracetool8.exe (aka atl mfc trace tool), as demonstrated by a directory that contains a trc, cur, rs, rct, or res file, aka \"mfc insecure library loading vulnerability.\" per: https://technet.microsoft.com/en-us/security/bulletin/ms11-025 access vector: network per \"this is a remote code execution vulnerability\" per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\ncwe-426: untrusted search path\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-08-31\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Permissions Privileges and Access Controls
Summary: feedwriter in mozilla firefox before 2.0.0.17 allows remote attackers to execute scripts with chrome privileges via vectors related to feed preview and the (1) elem.docommand, (2) elem.dispatchevent, (3) _settitletext, (4) _settitleimage, and (5) _initsubscriptionui functions.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-09-24
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: feedwriter in mozilla firefox before 2.0.0.17 allows remote attackers to execute scripts with chrome privileges via vectors related to feed preview and the (1) elem.docommand, (2) elem.dispatchevent, (3) _settitletext, (4) _settitleimage, and (5) _initsubscriptionui functions.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-09-24\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 189
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Numeric Errors
Summary: integer overflow in memory manager in microsoft windows xp sp2 and sp3, server 2003 sp1 and sp2, vista gold and sp1, and server 2008 allows local users to gain privileges via a crafted application that triggers an erroneous decrement of a variable, related to validation of parameters for virtual address descriptors (vads) and a "memory allocation mapping error," aka "virtual address descriptor elevation of privilege vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2008-10-15
Last Modified Date: 2019-02-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Numeric Errors.",
"role": "user"
},
{
"content": "CWE Code: 189\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Numeric Errors\nSummary: integer overflow in memory manager in microsoft windows xp sp2 and sp3, server 2003 sp1 and sp2, vista gold and sp1, and server 2008 allows local users to gain privileges via a crafted application that triggers an erroneous decrement of a variable, related to validation of parameters for virtual address descriptors (vads) and a \"memory allocation mapping error,\" aka \"virtual address descriptor elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2008-10-15\nLast Modified Date: 2019-02-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: router.php in the harmis ek rishta (aka ek-rishta) 2.10 component for joomla! allows sql injection via the path_info to a home/requested_user/sent%20interest/ uri.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-06-12
Last Modified Date: 2018-08-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: router.php in the harmis ek rishta (aka ek-rishta) 2.10 component for joomla! allows sql injection via the path_info to a home/requested_user/sent%20interest/ uri.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-06-12\nLast Modified Date: 2018-08-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: xxxtreenode method sql injection remote code execution (rce) vulnerabilities in trend micro control manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-02-09
Last Modified Date: 2018-02-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: xxxtreenode method sql injection remote code execution (rce) vulnerabilities in trend micro control manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-02-09\nLast Modified Date: 2018-02-27",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: cells blog 3.5 has sql injection via the pub_readpost.php ptid parameter.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-28
Last Modified Date: 2018-04-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: cells blog 3.5 has sql injection via the pub_readpost.php ptid parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-28\nLast Modified Date: 2018-04-13",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection exists in the jobs factory 2.0.4 component for joomla! via the filter_letter parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-09-28
Last Modified Date: 2018-11-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in the jobs factory 2.0.4 component for joomla! via the filter_letter parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-09-28\nLast Modified Date: 2018-11-15",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in the log-in form in truworth flex timesheet allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-04-27
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the log-in form in truworth flex timesheet allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password fields.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-04-27\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in info.php in scriptsfeed and brotherscripts (bs) scripts directory allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-07-28
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in info.php in scriptsfeed and brotherscripts (bs) scripts directory allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-07-28\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the wpml plugin before 3.1.9 for wordpress allows remote attackers to execute arbitrary sql commands via the lang parameter in the http referer header in a wp-link-ajax action to comments/feed.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-03-17
Last Modified Date: 2018-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the wpml plugin before 3.1.9 for wordpress allows remote attackers to execute arbitrary sql commands via the lang parameter in the http referer header in a wp-link-ajax action to comments/feed.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-03-17\nLast Modified Date: 2018-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in itechbids 7.0 gold allow remote attackers to execute arbitrary sql commands via (1) the seller_id parameter in sellers_othersitem.php, (2) the productid parameter in classifieds.php, and (3) the id parameter in shop.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-07-21
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in itechbids 7.0 gold allow remote attackers to execute arbitrary sql commands via (1) the seller_id parameter in sellers_othersitem.php, (2) the productid parameter in classifieds.php, and (3) the id parameter in shop.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-07-21\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: a sql injection vulnerability was discovered in hrsale the ultimate hrm v1.0.2 that allows a user with low level privileges to directly modify the sql query.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-05-01
Last Modified Date: 2018-06-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection vulnerability was discovered in hrsale the ultimate hrm v1.0.2 that allows a user with low level privileges to directly modify the sql query.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-05-01\nLast Modified Date: 2018-06-13",
"role": "assistant"
}
] |
CWE Code: 120
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary: a elevation of privilege vulnerability in the android media framework (libeffects). product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-37536407.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-09-08
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow').",
"role": "user"
},
{
"content": "CWE Code: 120\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')\nSummary: a elevation of privilege vulnerability in the android media framework (libeffects). product: android. versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. android id: a-37536407.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-09-08\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Permissions Privileges and Access Controls
Summary: zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). that could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-02-27
Last Modified Date: 2018-03-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). that could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where \"env_reset\" has been disabled.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-02-27\nLast Modified Date: 2018-03-21",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in threads.php in nuboard 0.5 allows remote attackers to execute arbitrary sql commands via the ssid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-02-15
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in threads.php in nuboard 0.5 allows remote attackers to execute arbitrary sql commands via the ssid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-15\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 5.5
CWE Name: Permissions Privileges and Access Controls
Summary: the portal interface in cisco secure access control system (acs) does not properly manage sessions, which allows remote authenticated users to hijack sessions and gain privileges via unspecified vectors, aka bug id cscue65951.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/NONE
Published Date: 2014-01-25
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: the portal interface in cisco secure access control system (acs) does not properly manage sessions, which allows remote authenticated users to hijack sessions and gain privileges via unspecified vectors, aka bug id cscue65951.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2014-01-25\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in adherents/subscription/info.php in dolibarr erp/crm version 6.0.4 allows remote attackers to execute arbitrary sql commands via the rowid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-27
Last Modified Date: 2018-01-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in adherents/subscription/info.php in dolibarr erp/crm version 6.0.4 allows remote attackers to execute arbitrary sql commands via the rowid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-27\nLast Modified Date: 2018-01-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in includes/functions/banners-external.php in phpbp 2 rc3 (2.204) fix 4 allows remote attackers to execute arbitrary sql commands via the id parameter in a banner_out action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-03-20
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in includes/functions/banners-external.php in phpbp 2 rc3 (2.204) fix 4 allows remote attackers to execute arbitrary sql commands via the id parameter in a banner_out action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-03-20\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 78
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary: an authenticated command injection vulnerability exists in status_interfaces.php via dhcp_relinquish_lease() in pfsense before 2.4.4 due to its passing user input from the $_post parameters "ifdescr" and "ipv" to a shell without escaping the contents of the variables. this allows an authenticated webgui user with privileges for the affected page to execute commands in the context of the root user when submitting a request to relinquish a dhcp lease for an interface which is configured to obtain its address via dhcp.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-09-26
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: an authenticated command injection vulnerability exists in status_interfaces.php via dhcp_relinquish_lease() in pfsense before 2.4.4 due to its passing user input from the $_post parameters \"ifdescr\" and \"ipv\" to a shell without escaping the contents of the variables. this allows an authenticated webgui user with privileges for the affected page to execute commands in the context of the root user when submitting a request to relinquish a dhcp lease for an interface which is configured to obtain its address via dhcp.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-09-26\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an issue was discovered in certain apple products. ios before 11 is affected. tvos before 11 is affected. watchos before 4 is affected. the issue involves the "wi-fi" component. it might allow remote attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via crafted wi-fi traffic.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-10-23
Last Modified Date: 2019-03-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 11 is affected. tvos before 11 is affected. watchos before 4 is affected. the issue involves the \"wi-fi\" component. it might allow remote attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via crafted wi-fi traffic.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-10-23\nLast Modified Date: 2019-03-08",
"role": "assistant"
}
] |
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Untrusted Search Path
Summary: untrusted search path vulnerability in skype for windows allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-06-26
Last Modified Date: 2018-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in skype for windows allows an attacker to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-06-26\nLast Modified Date: 2018-08-17",
"role": "assistant"
}
] |
CWE Code: 399
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Resource Management Errors
Summary: sun solaris 8, 9, and 10 allows "remote privileged" users to cause a denial of service (panic) via unknown vectors related to self encapsulated ip packets.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2008-04-14
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Resource Management Errors.",
"role": "user"
},
{
"content": "CWE Code: 399\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Resource Management Errors\nSummary: sun solaris 8, 9, and 10 allows \"remote privileged\" users to cause a denial of service (panic) via unknown vectors related to self encapsulated ip packets.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2008-04-14\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in albumdetail.php in opial 1.0 allows remote attackers to execute arbitrary sql commands via the albumid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-07-07
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in albumdetail.php in opial 1.0 allows remote attackers to execute arbitrary sql commands via the albumid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-07-07\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the bf survey pro (com_bfsurvey_pro) component before 1.3.1, bf survey pro free (com_bfsurvey_profree) component 1.2.6, and bf survey basic component before 1.2 for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter to index.php. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-06-09
Last Modified Date: 2010-06-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the bf survey pro (com_bfsurvey_pro) component before 1.3.1, bf survey pro free (com_bfsurvey_profree) component 1.2.6, and bf survey basic component before 1.2 for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter to index.php. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-06-09\nLast Modified Date: 2010-06-10",
"role": "assistant"
}
] |
CWE Code: 78
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary: a vulnerability in the cisco webex teams client, formerly cisco spark, could allow an attacker to execute arbitrary commands on a targeted system. this vulnerability is due to unsafe search paths used by the application uri that is defined in windows operating systems. an attacker could exploit this vulnerability by convincing a targeted user to follow a malicious link. successful exploitation could cause the application to load libraries from the directory targeted by the uri link. the attacker could use this behavior to execute arbitrary commands on the system with the privileges of the targeted user if the attacker can place a crafted library in a directory that is accessible to the vulnerable system.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-01-23
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: a vulnerability in the cisco webex teams client, formerly cisco spark, could allow an attacker to execute arbitrary commands on a targeted system. this vulnerability is due to unsafe search paths used by the application uri that is defined in windows operating systems. an attacker could exploit this vulnerability by convincing a targeted user to follow a malicious link. successful exploitation could cause the application to load libraries from the directory targeted by the uri link. the attacker could use this behavior to execute arbitrary commands on the system with the privileges of the targeted user if the attacker can place a crafted library in a directory that is accessible to the vulnerable system.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-01-23\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Permissions Privileges and Access Controls
Summary: huawei policy center with software before v100r003c10spc020 allows remote authenticated users to gain privileges and cause a denial of service (system crash) via a crafted url.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-04-12
Last Modified Date: 2016-04-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: huawei policy center with software before v100r003c10spc020 allows remote authenticated users to gain privileges and cause a denial of service (system crash) via a crafted url.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-04-12\nLast Modified Date: 2016-04-14",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Permissions Privileges and Access Controls
Summary: suphp before 0.6.3 allows local users to gain privileges via (1) a race condition that involves multiple symlink changes to point a file owned by a different user, or (2) a symlink to the directory of a different user, which is used to determine privileges. addition information can be found at:
http://secunia.com/advisories/29615/
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-04-02
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: suphp before 0.6.3 allows local users to gain privileges via (1) a race condition that involves multiple symlink changes to point a file owned by a different user, or (2) a symlink to the directory of a different user, which is used to determine privileges. addition information can be found at:\r\n\r\nhttp://secunia.com/advisories/29615/\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-04-02\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: car rental script 2.0.4 has sql injection via the countrycode1.php val parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-13
Last Modified Date: 2017-12-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: car rental script 2.0.4 has sql injection via the countrycode1.php val parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-13\nLast Modified Date: 2017-12-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in notes.php in my kazaam notes management system allows remote attackers to execute arbitrary sql commands via vectors involving the "enter reference number below" text box.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-11-01
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in notes.php in my kazaam notes management system allows remote attackers to execute arbitrary sql commands via vectors involving the \"enter reference number below\" text box.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-01\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 416
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Use After Free
Summary: in removeinterfaceaddress of networkcontroller.cpp, there is a possible use after free. this could lead to remote code execution with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android-9. android id: a-119496789.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-04-19
Last Modified Date: 2019-04-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Use After Free.",
"role": "user"
},
{
"content": "CWE Code: 416\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Use After Free\nSummary: in removeinterfaceaddress of networkcontroller.cpp, there is a possible use after free. this could lead to remote code execution with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: android-9. android id: a-119496789.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-04-19\nLast Modified Date: 2019-04-22",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.0
CWE Name: Permissions Privileges and Access Controls
Summary: the xml parser in splunk 4.0.0 through 4.1.4 allows remote authenticated users to obtain sensitive information and gain privileges via an xml external entity (xxe) attack to unknown vectors.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-09-14
Last Modified Date: 2010-09-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: the xml parser in splunk 4.0.0 through 4.1.4 allows remote authenticated users to obtain sensitive information and gain privileges via an xml external entity (xxe) attack to unknown vectors.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-09-14\nLast Modified Date: 2010-09-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in acidcat cms 3.4.1 allow remote attackers to execute arbitrary sql commands via the (1) cid parameter to default.asp and the (2) username parameter to main_login2.asp.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-04-27
Last Modified Date: 2018-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in acidcat cms 3.4.1 allow remote attackers to execute arbitrary sql commands via the (1) cid parameter to default.asp and the (2) username parameter to main_login2.asp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-04-27\nLast Modified Date: 2018-10-11",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in fmoblog.php in the fmoblog plugin 2.1 for wordpress allows remote attackers to execute arbitrary sql commands via the id parameter to index.php. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-03-19
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in fmoblog.php in the fmoblog plugin 2.1 for wordpress allows remote attackers to execute arbitrary sql commands via the id parameter to index.php. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-19\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in bios.php in php scripts now president bios allows remote attackers to execute arbitrary sql commands via the rank parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-08-20
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in bios.php in php scripts now president bios allows remote attackers to execute arbitrary sql commands via the rank parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-08-20\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in viewpost.php in mblogger 1.0.04 allows remote attackers to execute arbitrary sql commands via the postid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-10-07
Last Modified Date: 2017-11-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in viewpost.php in mblogger 1.0.04 allows remote attackers to execute arbitrary sql commands via the postid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-10-07\nLast Modified Date: 2017-11-30",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Out-of-bounds Write
Summary: in skswizzler::onsetsamplex of skswizzler.cpp, there is a possible out of bounds write due to a missing bounds check. this could lead to remote escalation of privilege in system_server with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-9. android id: a-117838472.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-02-28
Last Modified Date: 2019-03-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Out-of-bounds Write\nSummary: in skswizzler::onsetsamplex of skswizzler.cpp, there is a possible out of bounds write due to a missing bounds check. this could lead to remote escalation of privilege in system_server with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-9. android id: a-117838472.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-02-28\nLast Modified Date: 2019-03-01",
"role": "assistant"
}
] |
CWE Code: 416
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Use After Free
Summary: a elevation of privilege vulnerability in the android media framework (libgui). product: android. versions: 7.0, 7.1.1, 7.1.2. android id: a-33004354.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-08-09
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Use After Free.",
"role": "user"
},
{
"content": "CWE Code: 416\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Use After Free\nSummary: a elevation of privilege vulnerability in the android media framework (libgui). product: android. versions: 7.0, 7.1.1, 7.1.2. android id: a-33004354.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-08-09\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: ucms 1.4.6 has sql injection during installation via the install/index.php mysql_dbname parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-09-14
Last Modified Date: 2018-11-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: ucms 1.4.6 has sql injection during installation via the install/index.php mysql_dbname parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-09-14\nLast Modified Date: 2018-11-07",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.6
CWE Name: Permissions Privileges and Access Controls
Summary: an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31798848. references: n-cve-2016-8449.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-01-12
Last Modified Date: 2017-10-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability in the nvidia gpu driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10. android id: a-31798848. references: n-cve-2016-8449.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-10-19",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Permissions Privileges and Access Controls
Summary: drivers/mmc/card/mmc_block_test.c in the qualcomm components in android before 2016-08-05 on nexus 5 devices does not reject kernel-space buffer addresses, which allows attackers to gain privileges via a crafted application, aka android internal bug 28769208 and qualcomm internal bug cr547479.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-08-06
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: drivers/mmc/card/mmc_block_test.c in the qualcomm components in android before 2016-08-05 on nexus 5 devices does not reject kernel-space buffer addresses, which allows attackers to gain privileges via a crafted application, aka android internal bug 28769208 and qualcomm internal bug cr547479.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-08-06\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.0
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in manage_user_page.php in mantisbt before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote administrators with file privileges to execute arbitrary sql commands via the mantis_manage_users_cookie cookie.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-01-26
Last Modified Date: 2017-09-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in manage_user_page.php in mantisbt before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote administrators with file privileges to execute arbitrary sql commands via the mantis_manage_users_cookie cookie.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-01-26\nLast Modified Date: 2017-09-08",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 8.3
CWE Name: Out-of-bounds Write
Summary: in process_service_attr_req of sdp_server.c, there is an out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. android id: a-68776054.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-04-04
Last Modified Date: 2018-05-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 8.3\nCWE Name: Out-of-bounds Write\nSummary: in process_service_attr_req of sdp_server.c, there is an out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. android id: a-68776054.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-04-04\nLast Modified Date: 2018-05-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: glpi before 9.1.5.1 has sql injection in the $crit variable in inc/computer_softwareversion.class.php, exploitable via ajax/common.tabs.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-07-20
Last Modified Date: 2017-07-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: glpi before 9.1.5.1 has sql injection in the $crit variable in inc/computer_softwareversion.class.php, exploitable via ajax/common.tabs.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-07-20\nLast Modified Date: 2017-07-21",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in thisraidprogress.php in the world of warcraft tracker infusion (raidtracker_panel) module 2.0 for php-fusion allows remote attackers to execute arbitrary sql commands via the info_raid_id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-09
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in thisraidprogress.php in the world of warcraft tracker infusion (raidtracker_panel) module 2.0 for php-fusion allows remote attackers to execute arbitrary sql commands via the info_raid_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-09\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: for the nvidia quadro, nvs, and geforce products, nvidia windows gpu display driver r340 before 342.00 and r375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for dxgddiescape id 0x100009a where a value passed from an user to the driver is used without validation as the index to an internal array, leading to denial of service or potential escalation of privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-11-08
Last Modified Date: 2019-03-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: for the nvidia quadro, nvs, and geforce products, nvidia windows gpu display driver r340 before 342.00 and r375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for dxgddiescape id 0x100009a where a value passed from an user to the driver is used without validation as the index to an internal array, leading to denial of service or potential escalation of privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-11-08\nLast Modified Date: 2019-03-07",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: vulnerability in wordpress plugin membership simplified v1.58, the code in membership-simplified-for-oap-members-only/updatedb.php is vulnerable to blind sql injection because it doesn't sanitize user input via recordid in the delete_media function.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-09-14
Last Modified Date: 2017-09-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: vulnerability in wordpress plugin membership simplified v1.58, the code in membership-simplified-for-oap-members-only/updatedb.php is vulnerable to blind sql injection because it doesn't sanitize user input via recordid in the delete_media function.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-09-14\nLast Modified Date: 2017-09-21",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the expandarguments function in the database abstraction api in drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct sql injection attacks via an array containing crafted keys.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-10-16
Last Modified Date: 2018-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the expandarguments function in the database abstraction api in drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct sql injection attacks via an array containing crafted keys.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-10-16\nLast Modified Date: 2018-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the get_history_lastid function in the nodewatcher component in zabbix server before 1.6.8 allows remote attackers to execute arbitrary sql commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-12-31
Last Modified Date: 2010-02-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the get_history_lastid function in the nodewatcher component in zabbix server before 1.6.8 allows remote attackers to execute arbitrary sql commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-31\nLast Modified Date: 2010-02-02",
"role": "assistant"
}
] |
CWE Code: 434
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Unrestricted Upload of File with Dangerous Type
Summary: unrestricted file upload vulnerability in webadmin/ajaxfilemanager/ajaxfilemanager.php in netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote authenticated users with admin privileges on the cloud manager web console to execute arbitrary php code by uploading a file with a double extension, then accessing it via a direct request to the file in webadmin/deny/images/, as demonstrated by secuid0.php.gif.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-09-19
Last Modified Date: 2017-09-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Unrestricted Upload of File with Dangerous Type.",
"role": "user"
},
{
"content": "CWE Code: 434\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Unrestricted Upload of File with Dangerous Type\nSummary: unrestricted file upload vulnerability in webadmin/ajaxfilemanager/ajaxfilemanager.php in netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote authenticated users with admin privileges on the cloud manager web console to execute arbitrary php code by uploading a file with a double extension, then accessing it via a direct request to the file in webadmin/deny/images/, as demonstrated by secuid0.php.gif.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-09-19\nLast Modified Date: 2017-09-27",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Permissions Privileges and Access Controls
Summary: the fabric-interconnect component in cisco unified computing system (ucs) allows local users to gain privileges and read arbitrary files via crafted command parameters within the command-line interface, aka bug id csctr43374.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/NONE/NONE
Published Date: 2013-10-19
Last Modified Date: 2013-10-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: the fabric-interconnect component in cisco unified computing system (ucs) allows local users to gain privileges and read arbitrary files via crafted command parameters within the command-line interface, aka bug id csctr43374.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/NONE/NONE\nPublished Date: 2013-10-19\nLast Modified Date: 2013-10-21",
"role": "assistant"
}
] |
CWE Code: 428
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Unquoted Search Path or Element
Summary: an unquoted search path vulnerability was identified in lenovo dynamic power reduction utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-03-18
Last Modified Date: 2019-03-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Unquoted Search Path or Element.",
"role": "user"
},
{
"content": "CWE Code: 428\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Unquoted Search Path or Element\nSummary: an unquoted search path vulnerability was identified in lenovo dynamic power reduction utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-03-18\nLast Modified Date: 2019-03-21",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 5.5
CWE Name: Improper Input Validation
Summary: the local file editor in the fabric-interconnect component in cisco unified computing system (ucs) allows local users to gain privileges, and read or modify arbitrary files, via unspecified key bindings, aka bug id csctn04521.
Access Authentication: SINGLE
Access Complexity: HIGH
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/NONE
Published Date: 2013-10-02
Last Modified Date: 2016-09-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Input Validation\nSummary: the local file editor in the fabric-interconnect component in cisco unified computing system (ucs) allows local users to gain privileges, and read or modify arbitrary files, via unspecified key bindings, aka bug id csctn04521.\nAccess Authentication: SINGLE\nAccess Complexity: HIGH\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/NONE\nPublished Date: 2013-10-02\nLast Modified Date: 2016-09-22",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: the session restore feature in mozilla firefox 3.x before 3.0.4 and 2.x before 2.0.0.18 allows remote attackers to violate the same origin policy to conduct cross-site scripting (xss) attacks and execute arbitrary javascript with chrome privileges via unknown vectors.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2008-11-13
Last Modified Date: 2018-11-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: the session restore feature in mozilla firefox 3.x before 3.0.4 and 2.x before 2.0.0.18 allows remote attackers to violate the same origin policy to conduct cross-site scripting (xss) attacks and execute arbitrary javascript with chrome privileges via unknown vectors.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2008-11-13\nLast Modified Date: 2018-11-02",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 2.9
CWE Name: Out-of-bounds Read
Summary: in process_service_search_rsp of sdp_discovery.c, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure when connecting to a malicious bluetooth device with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9. android id: a-74249842.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2018-12-06
Last Modified Date: 2018-12-31 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 2.9\nCWE Name: Out-of-bounds Read\nSummary: in process_service_search_rsp of sdp_discovery.c, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure when connecting to a malicious bluetooth device with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9. android id: a-74249842.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-12-06\nLast Modified Date: 2018-12-31",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: nexusphp 1.5.beta5.20120707 has sql injection in forummanage.php via the sort parameter in an addforum action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-08-21
Last Modified Date: 2017-08-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: nexusphp 1.5.beta5.20120707 has sql injection in forummanage.php via the sort parameter in an addforum action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-08-21\nLast Modified Date: 2017-08-25",
"role": "assistant"
}
] |
CWE Code: 428
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Unquoted Search Path or Element
Summary: adobe creative cloud desktop application versions 4.4.1.298 and earlier have an exploitable unquoted search path vulnerability. successful exploitation could lead to local privilege escalation.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-05-19
Last Modified Date: 2018-06-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Unquoted Search Path or Element.",
"role": "user"
},
{
"content": "CWE Code: 428\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Unquoted Search Path or Element\nSummary: adobe creative cloud desktop application versions 4.4.1.298 and earlier have an exploitable unquoted search path vulnerability. successful exploitation could lead to local privilege escalation.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-05-19\nLast Modified Date: 2018-06-25",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 4.6
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the tasks plugin in brim 2.0.0, when magic_quotes_gpc is disabled, allows remote authenticated users to execute arbitrary sql commands via an arbitrary field in a search action to index.php.
Access Authentication: SINGLE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-09-15
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 4.6\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the tasks plugin in brim 2.0.0, when magic_quotes_gpc is disabled, allows remote authenticated users to execute arbitrary sql commands via an arbitrary field in a search action to index.php.\nAccess Authentication: SINGLE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-09-15\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in index.php in mim:infinix 1.2.003 and possibly earlier versions allow remote attackers to execute arbitrary sql commands via the (1) month and (2) year parameters in a calendar action, or (3) a search term in the search form.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-07-14
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in mim:infinix 1.2.003 and possibly earlier versions allow remote attackers to execute arbitrary sql commands via the (1) month and (2) year parameters in a calendar action, or (3) a search term in the search form.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-07-14\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the eyesofnetwork web interface (aka eonweb) 5.1-0 has sql injection via the term parameter to module/admin_group/search.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-09-13
Last Modified Date: 2017-09-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the eyesofnetwork web interface (aka eonweb) 5.1-0 has sql injection via the term parameter to module/admin_group/search.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-09-13\nLast Modified Date: 2017-09-18",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: new relic .net agent before 6.3.123.0 adds sql injection flaws to safe applications via vectors involving failure to escape quotes during use of the slow queries feature, as demonstrated by a mishandled quote in a values clause of an insert statement, after bypassing a set showplan_all on protection mechanism.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-06-13
Last Modified Date: 2017-07-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: new relic .net agent before 6.3.123.0 adds sql injection flaws to safe applications via vectors involving failure to escape quotes during use of the slow queries feature, as demonstrated by a mishandled quote in a values clause of an insert statement, after bypassing a set showplan_all on protection mechanism.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-06-13\nLast Modified Date: 2017-07-05",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in view_news.php in vastal i-tech jobs zone allows remote attackers to execute arbitrary sql commands via the news_id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-07
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in view_news.php in vastal i-tech jobs zone allows remote attackers to execute arbitrary sql commands via the news_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-07\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 772
Vulnerability Type: privilege_escalation
CVSS Score: 4.9
CWE Name: Missing Release of Resource after Effective Lifetime
Summary: memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c in qemu (aka quick emulator) allows local guest os privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2017-05-02
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Missing Release of Resource after Effective Lifetime.",
"role": "user"
},
{
"content": "CWE Code: 772\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Missing Release of Resource after Effective Lifetime\nSummary: memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c in qemu (aka quick emulator) allows local guest os privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2017-05-02\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: multiple cross-site scripting (xss) vulnerabilities in index.php in tomatocms before 2.0.5 allow remote authenticated users, with "add new article" privileges, to inject arbitrary web script or html via the (1) title, (2) subtitle, and (3) author parameters in conjunction with a /admin/news/article/add path_info.
Access Authentication: SINGLE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2010-05-20
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: multiple cross-site scripting (xss) vulnerabilities in index.php in tomatocms before 2.0.5 allow remote authenticated users, with \"add new article\" privileges, to inject arbitrary web script or html via the (1) title, (2) subtitle, and (3) author parameters in conjunction with a /admin/news/article/add path_info.\nAccess Authentication: SINGLE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2010-05-20\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 6.6
CWE Name: Improper Input Validation
Summary: a vulnerability in the cli implementation of a specific command used for image maintenance for cisco nx-os software could allow an authenticated, local attacker to overwrite any file on the file system including system files. these file overwrites by the attacker are accomplished at the root privilege level. the vulnerability occurs because there is no verification of user-input parameters and or digital-signature verification for image files when using a specific cli command. an attacker could exploit this vulnerability by authenticating to the device and issuing a command at the cli. because an exploit could allow the attacker to overwrite any file on the disk, including system files, a denial of service (dos) condition could occur. the attacker must have valid administrator credentials for the affected device to exploit this vulnerability.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/COMPLETE/COMPLETE
Published Date: 2019-05-15
Last Modified Date: 2019-05-20 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.6\nCWE Name: Improper Input Validation\nSummary: a vulnerability in the cli implementation of a specific command used for image maintenance for cisco nx-os software could allow an authenticated, local attacker to overwrite any file on the file system including system files. these file overwrites by the attacker are accomplished at the root privilege level. the vulnerability occurs because there is no verification of user-input parameters and or digital-signature verification for image files when using a specific cli command. an attacker could exploit this vulnerability by authenticating to the device and issuing a command at the cli. because an exploit could allow the attacker to overwrite any file on the disk, including system files, a denial of service (dos) condition could occur. the attacker must have valid administrator credentials for the affected device to exploit this vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/COMPLETE/COMPLETE\nPublished Date: 2019-05-15\nLast Modified Date: 2019-05-20",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: heap-based buffer overflow in aswrdr.sys (aka the tdi rdr driver) in avast! home and professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to ioctl 0x80002024.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2009-11-23
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: heap-based buffer overflow in aswrdr.sys (aka the tdi rdr driver) in avast! home and professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to ioctl 0x80002024.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2009-11-23\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in koan software mega mall allow remote attackers to execute arbitrary sql commands via the (1) t, (2) productid, (3) sk, (4) x, or (5) so parameter to (a) product_review.php; or the (6) orderno parameter to (b) order-track.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-03-20
Last Modified Date: 2017-07-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in koan software mega mall allow remote attackers to execute arbitrary sql commands via the (1) t, (2) productid, (3) sk, (4) x, or (5) so parameter to (a) product_review.php; or the (6) orderno parameter to (b) order-track.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-03-20\nLast Modified Date: 2017-07-29",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: array index error in the xnu (mach) kernel in apple mac os x 10.5 before 10.5.7 allows local users to gain privileges or cause a denial of service (system shutdown) via unspecified vectors related to workqueues.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2009-05-13
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: array index error in the xnu (mach) kernel in apple mac os x 10.5 before 10.5.7 allows local users to gain privileges or cause a denial of service (system shutdown) via unspecified vectors related to workqueues.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2009-05-13\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in crm/core/page/ajax/location.php in civicrm before 4.2.12, 4.3.x before 4.3.7, and 4.4.x before 4.4.beta4 allow remote attackers to execute arbitrary sql commands via the _value parameter to (1) ajax/jqstate or (2) ajax/jqcounty.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2013-11-27
Last Modified Date: 2013-11-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in crm/core/page/ajax/location.php in civicrm before 4.2.12, 4.3.x before 4.3.7, and 4.4.x before 4.4.beta4 allow remote attackers to execute arbitrary sql commands via the _value parameter to (1) ajax/jqstate or (2) ajax/jqcounty.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-11-27\nLast Modified Date: 2013-11-29",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 6.0
CWE Name: Improper Input Validation
Summary: unspecified vulnerability in the subscriptions manager in invision power board (ipb or ip.board) 2.3.1 before 20070912 allows remote authenticated users to change the member id and reduce the privilege level of arbitrary users via a crafted payment form, related to (1) class_gw_2checkout.php, (2) class_gw_authorizenet.php, (3) class_gw_nochex.php, (4) class_gw_paypal.php, and (5) class_gw_safshop.php in sources/classes/paymentgateways/.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-09-17
Last Modified Date: 2017-07-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.0\nCWE Name: Improper Input Validation\nSummary: unspecified vulnerability in the subscriptions manager in invision power board (ipb or ip.board) 2.3.1 before 20070912 allows remote authenticated users to change the member id and reduce the privilege level of arbitrary users via a crafted payment form, related to (1) class_gw_2checkout.php, (2) class_gw_authorizenet.php, (3) class_gw_nochex.php, (4) class_gw_paypal.php, and (5) class_gw_safshop.php in sources/classes/paymentgateways/.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-09-17\nLast Modified Date: 2017-07-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Permissions Privileges and Access Controls
Summary: fs/open.c in the linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped i/o.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-09-29
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: fs/open.c in the linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped i/o.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-09-29\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 287
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Improper Authentication
Summary: zuuse beims contractorweb .net 5.18.0.0 allows access to various /usermanagement/ privileged modules without authenticating the user; an attacker can misuse these functionalities to perform unauthorized actions, as demonstrated by edit user details.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-01-15
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Authentication.",
"role": "user"
},
{
"content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Improper Authentication\nSummary: zuuse beims contractorweb .net 5.18.0.0 allows access to various /usermanagement/ privileged modules without authenticating the user; an attacker can misuse these functionalities to perform unauthorized actions, as demonstrated by edit user details.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-01-15\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 732
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Incorrect Permission Assignment for Critical Resource
Summary: improper directory permissions in the installer for the intel parallel studio before 2019 gold may allow authenticated users to potentially enable an escalation of privilege via local access.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-12-14
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.",
"role": "user"
},
{
"content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: improper directory permissions in the installer for the intel parallel studio before 2019 gold may allow authenticated users to potentially enable an escalation of privilege via local access.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-12-14\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in jaw portal and zanfi cms lite and allows remote attackers to execute arbitrary sql commands via the page (pageid) parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-09-22
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in jaw portal and zanfi cms lite and allows remote attackers to execute arbitrary sql commands via the page (pageid) parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-09-22\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 287
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Improper Authentication
Summary: ibm security guardium 9.0, 9.5, and 10.6 are vulnerable to a privilege escalation which could allow an authenticated user to change the accessmgr password. ibm x-force id: 162768.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-10-03
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Authentication.",
"role": "user"
},
{
"content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Authentication\nSummary: ibm security guardium 9.0, 9.5, and 10.6 are vulnerable to a privilege escalation which could allow an authenticated user to change the accessmgr password. ibm x-force id: 162768.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-10-03\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 2.6
CWE Name: Information Exposure
Summary: an information disclosure vulnerability in the mediatek driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: n/a. android id: a-31528889. references: mt-alps02961395.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2017-01-12
Last Modified Date: 2017-01-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.6\nCWE Name: Information Exposure\nSummary: an information disclosure vulnerability in the mediatek driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: n/a. android id: a-31528889. references: mt-alps02961395.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-01-12\nLast Modified Date: 2017-01-18",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Permissions Privileges and Access Controls
Summary: docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a dockerfile in an lzma (.xz) archive, related to the chroot for archive extraction.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-12-16
Last Modified Date: 2018-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a dockerfile in an lzma (.xz) archive, related to the chroot for archive extraction.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-12-16\nLast Modified Date: 2018-10-09",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: a stored web content injection vulnerability (wci, a.k.a xss) is present in modx revolution cms version 2.5.6 and earlier. an authenticated user with permissions to edit users can save malicious javascript as a user group name and potentially take control over victims' accounts. this can lead to an escalation of privileges providing complete administrative control over the cms.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2017-11-17
Last Modified Date: 2017-12-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: a stored web content injection vulnerability (wci, a.k.a xss) is present in modx revolution cms version 2.5.6 and earlier. an authenticated user with permissions to edit users can save malicious javascript as a user group name and potentially take control over victims' accounts. this can lead to an escalation of privileges providing complete administrative control over the cms.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2017-11-17\nLast Modified Date: 2017-12-01",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in viewalbums.php in musicbox 2.3.6 and 2.3.7 allows remote attackers to execute arbitrary sql commands via the artistid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-05-09
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in viewalbums.php in musicbox 2.3.6 and 2.3.7 allows remote attackers to execute arbitrary sql commands via the artistid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-09\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 3.3
CWE Name: Improper Access Control
Summary: vulnerability in the oracle hospitality cruise shipboard property management system component of oracle hospitality applications (subcomponent: spms suite). the supported version that is affected is 8.0.8. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle hospitality cruise shipboard property management system executes to compromise oracle hospitality cruise shipboard property management system. successful attacks require human interaction from a person other than the attacker and while the vulnerability is in oracle hospitality cruise shipboard property management system, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of oracle hospitality cruise shipboard property management system as well as unauthorized update, insert or delete access to some of oracle hospitality cruise shipboard property management system accessible data and unauthorized read access to a subset of oracle hospitality cruise shipboard property management system accessible data. cvss 3.0 base score 7.3 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:r/s:c/c:l/i:l/a:h).
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): NONE/PARTIAL/PARTIAL
Published Date: 2019-01-16
Last Modified Date: 2019-01-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 3.3\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle hospitality cruise shipboard property management system component of oracle hospitality applications (subcomponent: spms suite). the supported version that is affected is 8.0.8. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle hospitality cruise shipboard property management system executes to compromise oracle hospitality cruise shipboard property management system. successful attacks require human interaction from a person other than the attacker and while the vulnerability is in oracle hospitality cruise shipboard property management system, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of oracle hospitality cruise shipboard property management system as well as unauthorized update, insert or delete access to some of oracle hospitality cruise shipboard property management system accessible data and unauthorized read access to a subset of oracle hospitality cruise shipboard property management system accessible data. cvss 3.0 base score 7.3 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:r/s:c/c:l/i:l/a:h).\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/PARTIAL/PARTIAL\nPublished Date: 2019-01-16\nLast Modified Date: 2019-01-18",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.0
CWE Name: Permissions Privileges and Access Controls
Summary: cisco unified communications manager (aka unified cm) 9.1 (2.10000.28) and earlier allows local users to gain privileges by leveraging incorrect file permissions, aka bug ids cscul24917 and cscul24908.
Access Authentication: SINGLE
Access Complexity: HIGH
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2014-02-04
Last Modified Date: 2018-01-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: cisco unified communications manager (aka unified cm) 9.1 (2.10000.28) and earlier allows local users to gain privileges by leveraging incorrect file permissions, aka bug ids cscul24917 and cscul24908.\nAccess Authentication: SINGLE\nAccess Complexity: HIGH\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-02-04\nLast Modified Date: 2018-01-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: in redgate sql monitor before 3.10 and 4.x before 4.2, a remote attacker can gain unauthenticated access to the base monitor, resulting in the ability to execute arbitrary sql commands on any monitored microsoft sql server machines. if the base monitor is connecting to these machines using an account with sql admin privileges, then code execution on the operating system can result in full system compromise (if microsoft sql server is running with local administrator privileges).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-06-22
Last Modified Date: 2017-08-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: in redgate sql monitor before 3.10 and 4.x before 4.2, a remote attacker can gain unauthenticated access to the base monitor, resulting in the ability to execute arbitrary sql commands on any monitored microsoft sql server machines. if the base monitor is connecting to these machines using an account with sql admin privileges, then code execution on the operating system can result in full system compromise (if microsoft sql server is running with local administrator privileges).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-06-22\nLast Modified Date: 2017-08-13",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: the ryujit compiler in microsoft .net framework 4.6 produces incorrect code during an attempt at optimization, which allows remote attackers to execute arbitrary code via a crafted .net application, aka "ryujit optimization elevation of privilege vulnerability," a different vulnerability than cve-2015-2479 and cve-2015-2481.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-08-15
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: the ryujit compiler in microsoft .net framework 4.6 produces incorrect code during an attempt at optimization, which allows remote attackers to execute arbitrary code via a crafted .net application, aka \"ryujit optimization elevation of privilege vulnerability,\" a different vulnerability than cve-2015-2479 and cve-2015-2481.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-08-15\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in oracle database server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote authenticated users to execute arbitrary sql commands via vectors involving create index with a ctxsys.context indextype and dbms_stats.gather_table_stats.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-08-10
Last Modified Date: 2013-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in oracle database server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote authenticated users to execute arbitrary sql commands via vectors involving create index with a ctxsys.context indextype and dbms_stats.gather_table_stats.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-08-10\nLast Modified Date: 2013-10-11",
"role": "assistant"
}
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.