text
stringlengths
365
3.97k
conversations
listlengths
3
3
CWE Code: 281 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Preservation of Permissions Summary: win32k in microsoft windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "win32k elevation of privilege vulnerability". this cve id is unique from cve-2017-8577, cve-2017-8580, cve-2017-8581, and cve-2017-8467. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-07-11 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Preservation of Permissions.", "role": "user" }, { "content": "CWE Code: 281\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Preservation of Permissions\nSummary: win32k in microsoft windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, 1607, and 1703, and windows server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka \"win32k elevation of privilege vulnerability\". this cve id is unique from cve-2017-8577, cve-2017-8580, cve-2017-8581, and cve-2017-8467.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-07-11\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability to viewforum.php in s-cms 2.5 allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-03-23 Last Modified Date: 2011-03-24
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability to viewforum.php in s-cms 2.5 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-03-23\nLast Modified Date: 2011-03-24", "role": "assistant" } ]
CWE Code: 287 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Improper Authentication Summary: the cookie authentication method in wordpress 2.5 relies on a hash of a concatenated string containing username and expiry_time, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. note: this vulnerability exists because of an incomplete fix for cve-2007-6013. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-04-28 Last Modified Date: 2018-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Authentication.", "role": "user" }, { "content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Improper Authentication\nSummary: the cookie authentication method in wordpress 2.5 relies on a hash of a concatenated string containing username and expiry_time, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with \"admin\" to obtain administrator privileges, aka a \"cryptographic splicing\" issue. note: this vulnerability exists because of an incomplete fix for cve-2007-6013.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-04-28\nLast Modified Date: 2018-10-11", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: the new-contact-form-widget (aka contact form widget - contact query, form maker) plugin 1.0.9 for wordpress has sql injection via all-query-page.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-10-10 Last Modified Date: 2019-10-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the new-contact-form-widget (aka contact form widget - contact query, form maker) plugin 1.0.9 for wordpress has sql injection via all-query-page.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-10-10\nLast Modified Date: 2019-10-10", "role": "assistant" } ]
CWE Code: 78 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Summary: a vulnerability in the nx-api management application programming interface (api) in devices running, or based on, cisco nx-os software could allow an authenticated, remote attacker to execute commands with elevated privileges. the vulnerability is due to a failure to properly validate certain parameters included within an nx-api request. an attacker that can successfully authenticate to the nx-api could submit a request designed to bypass nx-os role assignment. a successful exploit could allow the attacker to execute commands with elevated privileges. this vulnerability affects the following if configured to use the nx-api feature: mds 9000 series multilayer switches, nexus 2000 series switches, nexus 3000 series switches, nexus 3500 platform switches, nexus 5500 platform switches, nexus 5600 platform switches, nexus 6000 series switches, nexus 7000 series switches, nexus 7700 series switches, nexus 9000 series switches in standalone nx-os mode. cisco bug ids: cscvc73177, cscve40903, cscve40911. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-06-20 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').", "role": "user" }, { "content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: a vulnerability in the nx-api management application programming interface (api) in devices running, or based on, cisco nx-os software could allow an authenticated, remote attacker to execute commands with elevated privileges. the vulnerability is due to a failure to properly validate certain parameters included within an nx-api request. an attacker that can successfully authenticate to the nx-api could submit a request designed to bypass nx-os role assignment. a successful exploit could allow the attacker to execute commands with elevated privileges. this vulnerability affects the following if configured to use the nx-api feature: mds 9000 series multilayer switches, nexus 2000 series switches, nexus 3000 series switches, nexus 3500 platform switches, nexus 5500 platform switches, nexus 5600 platform switches, nexus 6000 series switches, nexus 7000 series switches, nexus 7700 series switches, nexus 9000 series switches in standalone nx-os mode. cisco bug ids: cscvc73177, cscve40903, cscve40911.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-06-20\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 94 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Improper Control of Generation of Code ('Code Injection') Summary: in the automattic woocommerce plugin before 3.2.4 for wordpress, an attack is possible after gaining access to the target site with a user account that has at least shop manager privileges. the attacker then constructs a specifically crafted string that will turn into a php object injection involving the includes/shortcodes/class-wc-shortcode-products.php wc_shortcode_products::get_products() use of cached queries within shortcodes. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-01-15 Last Modified Date: 2019-02-07
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Control of Generation of Code ('Code Injection').", "role": "user" }, { "content": "CWE Code: 94\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Control of Generation of Code ('Code Injection')\nSummary: in the automattic woocommerce plugin before 3.2.4 for wordpress, an attack is possible after gaining access to the target site with a user account that has at least shop manager privileges. the attacker then constructs a specifically crafted string that will turn into a php object injection involving the includes/shortcodes/class-wc-shortcode-products.php wc_shortcode_products::get_products() use of cached queries within shortcodes.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-01-15\nLast Modified Date: 2019-02-07", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: cubecart before 6.1.13 has sql injection via the validate[] parameter of the "i forgot my password!" feature. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-01-15 Last Modified Date: 2019-01-23
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: cubecart before 6.1.13 has sql injection via the validate[] parameter of the \"i forgot my password!\" feature.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-01-15\nLast Modified Date: 2019-01-23", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in jobseekers/jobsearch.php (aka the search module) in pre job board allow remote attackers to execute arbitrary sql commands via the (1) position or (2) kw parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-06-30 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in jobseekers/jobsearch.php (aka the search module) in pre job board allow remote attackers to execute arbitrary sql commands via the (1) position or (2) kw parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-30\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in thanks.php in nexusphp 1.5 allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-10-21 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in thanks.php in nexusphp 1.5 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-10-21\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 78 Vulnerability Type: sql_injection CVSS Score: 10.0 CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Summary: in the mmm::agent::helpers::network::clear_ip function in mysql multi-master replication manager (mmm) mmm_agentd 2.2.1 (for solaris), a specially crafted mmm protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. an attacker that can initiate a tcp session with mmm\_agentd can trigger this vulnerability. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-05-09 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').", "role": "user" }, { "content": "CWE Code: 78\nVulnerability Type: sql_injection\nCVSS Score: 10.0\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: in the mmm::agent::helpers::network::clear_ip function in mysql multi-master replication manager (mmm) mmm_agentd 2.2.1 (for solaris), a specially crafted mmm protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\\_agentd process. an attacker that can initiate a tcp session with mmm\\_agentd can trigger this vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-05-09\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 3.6 CWE Name: Improper Access Control Summary: virtual hard disk driver in windows 10 gold, 1511, and 1607 and windows server 2016 does not properly restrict access to files, which allows local users to gain privileges via a crafted application, aka "vhd driver elevation of privilege vulnerability." Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/NONE Published Date: 2016-11-10 Last Modified Date: 2018-10-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 3.6\nCWE Name: Improper Access Control\nSummary: virtual hard disk driver in windows 10 gold, 1511, and 1607 and windows server 2016 does not properly restrict access to files, which allows local users to gain privileges via a crafted application, aka \"vhd driver elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2016-11-10\nLast Modified Date: 2018-10-12", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: an issue was discovered in certain apple products. macos before 10.12.4 is affected. the issue involves the "bluetooth" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-04-02 Last Modified Date: 2017-07-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. macos before 10.12.4 is affected. the issue involves the \"bluetooth\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-04-02\nLast Modified Date: 2017-07-12", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in airvae commerce 3.0 allows remote attackers to execute arbitrary sql commands via the pid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-11-25 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in airvae commerce 3.0 allows remote attackers to execute arbitrary sql commands via the pid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-11-25\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: cisco anyconnect secure mobility client before 3.1(8009) and 4.x before 4.0(2052) on linux does not properly implement unspecified internal functions, which allows local users to obtain root privileges via crafted vpnagent options, aka bug id cscus86790. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-06-04 Last Modified Date: 2017-01-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: cisco anyconnect secure mobility client before 3.1(8009) and 4.x before 4.0(2052) on linux does not properly implement unspecified internal functions, which allows local users to obtain root privileges via crafted vpnagent options, aka bug id cscus86790.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-06-04\nLast Modified Date: 2017-01-04", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.2 CWE Name: Permissions Privileges and Access Controls Summary: mozilla updater in mozilla firefox before 24.0, firefox esr 17.x before 17.0.9, thunderbird before 24.0, thunderbird esr 17.x before 17.0.9, and seamonkey before 2.21 does not ensure exclusive access to a mar file, which allows local users to gain privileges by creating a trojan horse file after mar signature verification but before mar use. Access Authentication: NONE Access Complexity: HIGH Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2013-09-18 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: mozilla updater in mozilla firefox before 24.0, firefox esr 17.x before 17.0.9, thunderbird before 24.0, thunderbird esr 17.x before 17.0.9, and seamonkey before 2.21 does not ensure exclusive access to a mar file, which allows local users to gain privileges by creating a trojan horse file after mar signature verification but before mar use.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-09-18\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 416 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Use After Free Summary: in bluetooth, there is a possible out of bounds read due to a use after free. this could lead to remote information disclosure with heap information written to the log with system execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-109755179 Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-09-27 Last Modified Date: 2019-09-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Use After Free.", "role": "user" }, { "content": "CWE Code: 416\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Use After Free\nSummary: in bluetooth, there is a possible out of bounds read due to a use after free. this could lead to remote information disclosure with heap information written to the log with system execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-109755179\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: d-park pro domain parking script 1.0 allows sql injection via the username to admin/loginform.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-10-29 Last Modified Date: 2017-11-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: d-park pro domain parking script 1.0 allows sql injection via the username to admin/loginform.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-10-29\nLast Modified Date: 2017-11-17", "role": "assistant" } ]
CWE Code: 287 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Improper Authentication Summary: the "remember me" functionality in login.php in burden before 1.8.1 allows remote attackers to bypass authentication and gain privileges by setting the burden_user_rememberme cookie to 1. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2014-01-26 Last Modified Date: 2018-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Authentication.", "role": "user" }, { "content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Improper Authentication\nSummary: the \"remember me\" functionality in login.php in burden before 1.8.1 allows remote attackers to bypass authentication and gain privileges by setting the burden_user_rememberme cookie to 1.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-01-26\nLast Modified Date: 2018-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the "biblio self autocomplete" submodule in the biblio autocomplete module 6.x-1.x before 6.x-1.1 and 7.x-1.x before 7.x-1.5 for drupal allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2014-08-14 Last Modified Date: 2017-09-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the \"biblio self autocomplete\" submodule in the biblio autocomplete module 6.x-1.x before 6.x-1.1 and 7.x-1.x before 7.x-1.5 for drupal allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-08-14\nLast Modified Date: 2017-09-08", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: buffer overflow in redis-cli of redis before 4.0.10 and 5.x before 5.0 rc3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. note: it is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-06-17 Last Modified Date: 2019-01-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in redis-cli of redis before 4.0.10 and 5.x before 5.0 rc3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. note: it is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-06-17\nLast Modified Date: 2019-01-17", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Input Validation Summary: login window in apple os x before 10.11.6 allows attackers to execute arbitrary code in a privileged context or obtain sensitive user information via a crafted app that leverages a "type confusion." Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-07-22 Last Modified Date: 2017-09-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Input Validation\nSummary: login window in apple os x before 10.11.6 allows attackers to execute arbitrary code in a privileged context or obtain sensitive user information via a crafted app that leverages a \"type confusion.\"\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-22\nLast Modified Date: 2017-09-01", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Permissions Privileges and Access Controls Summary: the developer-tools process in google chrome before 25.0.1364.97 on windows and linux, and before 25.0.1364.99 on mac os x, does not properly restrict privileges during interaction with a connected server, which has unspecified impact and attack vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2013-02-23 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: the developer-tools process in google chrome before 25.0.1364.97 on windows and linux, and before 25.0.1364.99 on mac os x, does not properly restrict privileges during interaction with a connected server, which has unspecified impact and attack vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-02-23\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Information Exposure Summary: emc networker 7.6.x and 8.x before 8.1 allows local users to obtain sensitive configuration information by leveraging operating-system privileges to perform decryption with nsradmin. Access Authentication: SINGLE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/NONE/NONE Published Date: 2013-07-31 Last Modified Date: 2013-07-31
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Information Exposure\nSummary: emc networker 7.6.x and 8.x before 8.1 allows local users to obtain sensitive configuration information by leveraging operating-system privileges to perform decryption with nsradmin.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/NONE/NONE\nPublished Date: 2013-07-31\nLast Modified Date: 2013-07-31", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: the visitors-online plugin before 0.4 for wordpress has sql injection. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-08-16 Last Modified Date: 2019-08-21
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the visitors-online plugin before 0.4 for wordpress has sql injection.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-16\nLast Modified Date: 2019-08-21", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 9.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple vulnerabilities in the web-based management interface of cisco firepower management center (fmc) software could allow an authenticated, remote attacker to execute arbitrary sql injections on an affected device. these vulnerabilities exist due to improper input validation. an attacker could exploit these vulnerabilities by sending crafted sql queries to an affected device. a successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-10-02 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 9.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple vulnerabilities in the web-based management interface of cisco firepower management center (fmc) software could allow an authenticated, remote attacker to execute arbitrary sql injections on an affected device. these vulnerabilities exist due to improper input validation. an attacker could exploit these vulnerabilities by sending crafted sql queries to an affected device. a successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-10-02\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in eagle software aeries browser interface (abi) 3.7.2.2 allow remote attackers to execute arbitrary sql commands via the (1) fc parameter to comments.asp, or the term parameter to (2) labels.asp or (3) classlist.asp. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-02-25 Last Modified Date: 2018-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in eagle software aeries browser interface (abi) 3.7.2.2 allow remote attackers to execute arbitrary sql commands via the (1) fc parameter to comments.asp, or the term parameter to (2) labels.asp or (3) classlist.asp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-25\nLast Modified Date: 2018-10-15", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection exists in the penny auction factory 2.0.4 component for joomla! via the filter_order_dir or filter_order parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-09-28 Last Modified Date: 2018-11-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in the penny auction factory 2.0.4 component for joomla! via the filter_order_dir or filter_order parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-09-28\nLast Modified Date: 2018-11-14", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: synetics gmbh i-doit 1.12 and earlier is affected by: sql injection. the impact is: unauthenticated mysql database access. the component is: web login form. the attack vector is: an attacker can exploit the vulnerability by sending a malicious http post request. the fixed version is: 1.12.1. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-07-18 Last Modified Date: 2019-07-23
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: synetics gmbh i-doit 1.12 and earlier is affected by: sql injection. the impact is: unauthenticated mysql database access. the component is: web login form. the attack vector is: an attacker can exploit the vulnerability by sending a malicious http post request. the fixed version is: 1.12.1.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-18\nLast Modified Date: 2019-07-23", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in interface/forms/eye_mag/php/anything_simple.php from library/forms.inc in versions of openemr before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary sql commands via the 'encounter' parameter. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-08-15 Last Modified Date: 2018-10-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in interface/forms/eye_mag/php/anything_simple.php from library/forms.inc in versions of openemr before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary sql commands via the 'encounter' parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-08-15\nLast Modified Date: 2018-10-12", "role": "assistant" } ]
CWE Code: 862 Vulnerability Type: privilege_escalation CVSS Score: 7.5 CWE Name: Missing Authorization Summary: unprivileged user can access all functions in the surveillance station component in qnap ts212p devices with firmware 4.2.1 build 20160601. unprivileged user cannot login at front end but with that unprivileged user sid, all function can access at surveillance station. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-08-18 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Missing Authorization.", "role": "user" }, { "content": "CWE Code: 862\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Missing Authorization\nSummary: unprivileged user can access all functions in the surveillance station component in qnap ts212p devices with firmware 4.2.1 build 20160601. unprivileged user cannot login at front end but with that unprivileged user sid, all function can access at surveillance station.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-08-18\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Permissions Privileges and Access Controls Summary: vmware-mount in vmware workstation 8.x and 9.x and vmware player 4.x and 5.x, on systems based on debian gnu/linux, allows host os users to gain host os privileges via a crafted lsb_release binary in a directory in the path, related to use of the popen library function. per: http://www.vmware.com/security/advisories/vmsa-2013-0010.html "the issue is present when workstation or player are installed on a debian-based version of linux." Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2013-08-24 Last Modified Date: 2013-08-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: vmware-mount in vmware workstation 8.x and 9.x and vmware player 4.x and 5.x, on systems based on debian gnu/linux, allows host os users to gain host os privileges via a crafted lsb_release binary in a directory in the path, related to use of the popen library function. per: http://www.vmware.com/security/advisories/vmsa-2013-0010.html\r\n\r\n\"the issue is present when workstation or player are installed on a debian-based version of linux.\"\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-08-24\nLast Modified Date: 2013-08-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in wp-includes/class-wp-query.php in wp_query in wordpress before 4.7.2 allows remote attackers to execute arbitrary sql commands by leveraging the presence of an affected plugin or theme that mishandles a crafted post type name. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-01-30 Last Modified Date: 2019-03-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in wp-includes/class-wp-query.php in wp_query in wordpress before 4.7.2 allows remote attackers to execute arbitrary sql commands by leveraging the presence of an affected plugin or theme that mishandles a crafted post type name.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-01-30\nLast Modified Date: 2019-03-19", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: fortinet forticlient linux sslvpn before build 2313, when installed on linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setuid program. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-01-08 Last Modified Date: 2016-12-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: fortinet forticlient linux sslvpn before build 2313, when installed on linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setuid program.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-01-08\nLast Modified Date: 2016-12-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in login.php in phpfootball 1.6 allows remote attackers to execute arbitrary sql commands via the user parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-02-23 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in login.php in phpfootball 1.6 allows remote attackers to execute arbitrary sql commands via the user parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-23\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 863 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Incorrect Authorization Summary: a vulnerability in the restricted shell of the cisco identity services engine (ise) that is accessible via ssh could allow an authenticated, local attacker to run arbitrary cli commands with elevated privileges. the vulnerability is due to incomplete input validation of the user input for cli commands issued at the restricted shell. an attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. an attacker would need valid user credentials to the device to exploit this vulnerability. the vulnerability affects the following cisco identity services engine (ise) products running release 1.4, 2.0, 2.0.1, 2.1.0: ise, ise express, ise virtual appliance. cisco bug ids: cscve74916. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-11-02 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Authorization.", "role": "user" }, { "content": "CWE Code: 863\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Incorrect Authorization\nSummary: a vulnerability in the restricted shell of the cisco identity services engine (ise) that is accessible via ssh could allow an authenticated, local attacker to run arbitrary cli commands with elevated privileges. the vulnerability is due to incomplete input validation of the user input for cli commands issued at the restricted shell. an attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. an attacker would need valid user credentials to the device to exploit this vulnerability. the vulnerability affects the following cisco identity services engine (ise) products running release 1.4, 2.0, 2.0.1, 2.1.0: ise, ise express, ise virtual appliance. cisco bug ids: cscve74916.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-11-02\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: a vulnerability in the london trust media private internet access (pia) vpn client v82 for macos could allow an authenticated, local attacker to run arbitrary code with elevated privileges. the openvpn_launcher binary is setuid root. this program is called during the connection process and executes several operating system utilities to configure the system. the networksetup utility is called using relative paths. a local unprivileged user can execute arbitrary commands as root by creating a networksetup trojan which will be executed during the connection process. this is possible because the path environment variable is not reset prior to executing the os utility. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-07-11 Last Modified Date: 2019-07-16
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: a vulnerability in the london trust media private internet access (pia) vpn client v82 for macos could allow an authenticated, local attacker to run arbitrary code with elevated privileges. the openvpn_launcher binary is setuid root. this program is called during the connection process and executes several operating system utilities to configure the system. the networksetup utility is called using relative paths. a local unprivileged user can execute arbitrary commands as root by creating a networksetup trojan which will be executed during the connection process. this is possible because the path environment variable is not reset prior to executing the os utility.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-07-11\nLast Modified Date: 2019-07-16", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows server 2012, and windows rt does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "win32k vulnerability." Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2013-07-10 Last Modified Date: 2019-02-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8, windows server 2012, and windows rt does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka \"win32k vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-07-10\nLast Modified Date: 2019-02-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in admin/login.asp in e. z. poll 2 allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-08-11 Last Modified Date: 2008-09-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in admin/login.asp in e. z. poll 2 allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-11\nLast Modified Date: 2008-09-05", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: an issue was discovered in pvpgn stats 2.4.6. sql injection exists in ladder/stats.php via the get sort_direction parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-06-12 Last Modified Date: 2018-07-24
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in pvpgn stats 2.4.6. sql injection exists in ladder/stats.php via the get sort_direction parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-06-12\nLast Modified Date: 2018-07-24", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.6 CWE Name: Permissions Privileges and Access Controls Summary: libspice, as used in qemu-kvm in the hypervisor (aka rhev-hypervisor) in red hat enterprise virtualization (rhev) 2.2 and qspice 0.3.0, does not properly restrict the addresses upon which memory-management actions are performed, which allows guest os users to cause a denial of service (guest os crash) or possibly gain privileges via unspecified vectors. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2010-08-24 Last Modified Date: 2010-08-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: libspice, as used in qemu-kvm in the hypervisor (aka rhev-hypervisor) in red hat enterprise virtualization (rhev) 2.2 and qspice 0.3.0, does not properly restrict the addresses upon which memory-management actions are performed, which allows guest os users to cause a denial of service (guest os crash) or possibly gain privileges via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-08-24\nLast Modified Date: 2010-08-25", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the search module in tru-zone nuke et 3.2, and possibly earlier versions, allows remote attackers to execute arbitrary sql commands via the query parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2005-11-22 Last Modified Date: 2011-08-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the search module in tru-zone nuke et 3.2, and possibly earlier versions, allows remote attackers to execute arbitrary sql commands via the query parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2005-11-22\nLast Modified Date: 2011-08-05", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 5.5 CWE Name: Improper Access Control Summary: vulnerability in the oracle applications manager component of oracle e-business suite (subcomponent: oracle diagnostics interfaces). supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.8. easily exploitable vulnerability allows high privileged attacker with network access via http to compromise oracle applications manager. successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all oracle applications manager accessible data as well as unauthorized access to critical data or complete access to all oracle applications manager accessible data. cvss 3.0 base score 6.5 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:h/i:h/a:n). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/NONE Published Date: 2019-07-23 Last Modified Date: 2019-07-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle applications manager component of oracle e-business suite (subcomponent: oracle diagnostics interfaces). supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.8. easily exploitable vulnerability allows high privileged attacker with network access via http to compromise oracle applications manager. successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all oracle applications manager accessible data as well as unauthorized access to critical data or complete access to all oracle applications manager accessible data. cvss 3.0 base score 6.5 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:h/i:h/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2019-07-23\nLast Modified Date: 2019-07-26", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 3.6 CWE Name: Permissions Privileges and Access Controls Summary: mantisbt before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to off, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary attachments. Access Authentication: SINGLE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/PARTIAL Published Date: 2012-06-17 Last Modified Date: 2013-08-27
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 3.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: mantisbt before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to off, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary attachments.\nAccess Authentication: SINGLE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/PARTIAL\nPublished Date: 2012-06-17\nLast Modified Date: 2013-08-27", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in domain technologie control (dtc) before 0.32.9 allow remote attackers to execute arbitrary sql commands via the cid parameter to (1) admin/bw_per_month.php or (2) client/bw_per_month.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-03-07 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in domain technologie control (dtc) before 0.32.9 allow remote attackers to execute arbitrary sql commands via the cid parameter to (1) admin/bw_per_month.php or (2) client/bw_per_month.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-03-07\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in read.php in riotpix 0.61 and earlier allows remote attackers to execute arbitrary sql commands via the forumid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-01-09 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in read.php in riotpix 0.61 and earlier allows remote attackers to execute arbitrary sql commands via the forumid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-01-09\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: hp arcsight logger 6.0.0.7307.1, arcsight command center 6.8.0.1896.0, and arcsight connector appliance 6.4.0.6881.3 use the root account to execute files owned by the arcsight user, which might allow local users to gain privileges by leveraging arcsight account access. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-11-04 Last Modified Date: 2018-10-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: hp arcsight logger 6.0.0.7307.1, arcsight command center 6.8.0.1896.0, and arcsight connector appliance 6.4.0.6881.3 use the root account to execute files owned by the arcsight user, which might allow local users to gain privileges by leveraging arcsight account access.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-11-04\nLast Modified Date: 2018-10-17", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Improper Input Validation Summary: arch/arm/mach-msm/qdsp6v2/ultrasound/usf.c in the qualcomm components in android before 2016-08-05 on nexus 5 and 7 (2013) devices does not properly validate input parameters, which allows attackers to gain privileges via a crafted application, aka android internal bug 28815575 and qualcomm internal bug cr555030. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-08-06 Last Modified Date: 2016-11-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Input Validation\nSummary: arch/arm/mach-msm/qdsp6v2/ultrasound/usf.c in the qualcomm components in android before 2016-08-05 on nexus 5 and 7 (2013) devices does not properly validate input parameters, which allows attackers to gain privileges via a crafted application, aka android internal bug 28815575 and qualcomm internal bug cr555030.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-08-06\nLast Modified Date: 2016-11-28", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in heartlogic hl-sitemanager allows remote attackers to execute arbitrary sql commands via unknown vectors. per: http://jvndb.jvn.jp/en/contents/2010/jvndb-2010-000010.html '[do not use hl-sitemanager] as patches will not be provided, users are recommended to discontinue use of hl-sitemanager and switch to a different product that provides equivalent functionality. ' Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-04-09 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in heartlogic hl-sitemanager allows remote attackers to execute arbitrary sql commands via unknown vectors. per: http://jvndb.jvn.jp/en/contents/2010/jvndb-2010-000010.html\r\n\r\n'[do not use hl-sitemanager]\r\n as patches will not be provided, users are recommended to discontinue use of hl-sitemanager and switch to a different product that provides equivalent functionality. '\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-04-09\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Permissions Privileges and Access Controls Summary: sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2010-02-24 Last Modified Date: 2018-10-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-02-24\nLast Modified Date: 2018-10-10", "role": "assistant" } ]
CWE Code: 1187 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Use of Uninitialized Resource Summary: in libxaac there is a possible information disclosure due to uninitialized data. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-113035224 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-09-27 Last Modified Date: 2019-10-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Use of Uninitialized Resource.", "role": "user" }, { "content": "CWE Code: 1187\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Use of Uninitialized Resource\nSummary: in libxaac there is a possible information disclosure due to uninitialized data. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-113035224\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-01", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in pagesquid cms 0.3 beta allows remote attackers to execute arbitrary sql commands via the page parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-06-27 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in pagesquid cms 0.3 beta allows remote attackers to execute arbitrary sql commands via the page parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-27\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: heap-based buffer overflow in the flask_security_label function in xen 3.3, when compiled with the xsm:flask module, allows unprivileged domain users (domu) to execute arbitrary code via the flask_op hypercall. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-08-14 Last Modified Date: 2017-08-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: heap-based buffer overflow in the flask_security_label function in xen 3.3, when compiled with the xsm:flask module, allows unprivileged domain users (domu) to execute arbitrary code via the flask_op hypercall.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-14\nLast Modified Date: 2017-08-08", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Input Validation Summary: win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 gold, sp2, and r2, and windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "win32k memory corruption vulnerability." Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2011-02-09 Last Modified Date: 2019-02-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp1 and sp2, windows server 2008 gold, sp2, and r2, and windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka \"win32k memory corruption vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2011-02-09\nLast Modified Date: 2019-02-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the indexed_search system extension in typo3 3.x, 4.0 through 4.0.7, and 4.1 through 4.1.3 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-12-15 Last Modified Date: 2017-08-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the indexed_search system extension in typo3 3.x, 4.0 through 4.0.7, and 4.1 through 4.1.3 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-12-15\nLast Modified Date: 2017-08-08", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 8.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: a security flaw was found in the chap_server_compute_md5() function in the iscsi target code in the linux kernel in a way an authentication request from an iscsi initiator is processed. an unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. the attack requires the iscsi target to be enabled on the victim host. depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iscsi target. due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/COMPLETE Published Date: 2018-09-25 Last Modified Date: 2018-11-27
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 8.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: a security flaw was found in the chap_server_compute_md5() function in the iscsi target code in the linux kernel in a way an authentication request from an iscsi initiator is processed. an unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. the attack requires the iscsi target to be enabled on the victim host. depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iscsi target. due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/COMPLETE\nPublished Date: 2018-09-25\nLast Modified Date: 2018-11-27", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in track.php in scripts for sites (sfs) ez biz pro allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-02-23 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in track.php in scripts for sites (sfs) ez biz pro allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-23\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in awards.php in psychostats 3.2.2b allows remote attackers to execute arbitrary sql commands via the d parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2013-05-31 Last Modified Date: 2013-05-31
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in awards.php in psychostats 3.2.2b allows remote attackers to execute arbitrary sql commands via the d parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-05-31\nLast Modified Date: 2013-05-31", "role": "assistant" } ]
CWE Code: 19 Vulnerability Type: privilege_escalation CVSS Score: 4.4 CWE Name: Data Processing Errors Summary: wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) set, (2) set_cred, or (3) set_network command. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-05-09 Last Modified Date: 2017-10-23
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Data Processing Errors.", "role": "user" }, { "content": "CWE Code: 19\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Data Processing Errors\nSummary: wpa_supplicant 0.4.0 through 2.5 does not reject \\n and \\r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) set, (2) set_cred, or (3) set_network command.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-05-09\nLast Modified Date: 2017-10-23", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in graph_view.php in cacti 0.8.8.g allows remote authenticated users to execute arbitrary sql commands via the host_group_data parameter. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-04-11 Last Modified Date: 2016-12-01
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in graph_view.php in cacti 0.8.8.g allows remote authenticated users to execute arbitrary sql commands via the host_group_data parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-04-11\nLast Modified Date: 2016-12-01", "role": "assistant" } ]
CWE Code: 362 Vulnerability Type: privilege_escalation CVSS Score: 4.4 CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Summary: transports/appendfile.c in exim before 4.72, when mbx locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-06-07 Last Modified Date: 2018-10-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').", "role": "user" }, { "content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: transports/appendfile.c in exim before 4.72, when mbx locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-06-07\nLast Modified Date: 2018-10-10", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in opensis 4.5 through 5.3 allows remote attackers to execute arbitrary sql commands via the username and password to index.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2014-10-20 Last Modified Date: 2014-10-24
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in opensis 4.5 through 5.3 allows remote attackers to execute arbitrary sql commands via the username and password to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-10-20\nLast Modified Date: 2014-10-24", "role": "assistant" } ]
CWE Code: 287 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Improper Authentication Summary: authentication bypass in the intel raid web console 3 for windows before 4.186 may allow an unprivileged user to potentially gain administrative privileges via local access. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2018-11-14 Last Modified Date: 2018-12-31
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Authentication.", "role": "user" }, { "content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Authentication\nSummary: authentication bypass in the intel raid web console 3 for windows before 4.186 may allow an unprivileged user to potentially gain administrative privileges via local access.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-11-14\nLast Modified Date: 2018-12-31", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: an issue was discovered in certain apple products. ios before 10.3 is affected. macos before 10.12.4 is affected. tvos before 10.2 is affected. watchos before 3.2 is affected. the issue involves the "kernel" component. a buffer overflow allows attackers to execute arbitrary code in a privileged context via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-04-02 Last Modified Date: 2019-03-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 10.3 is affected. macos before 10.12.4 is affected. tvos before 10.2 is affected. watchos before 3.2 is affected. the issue involves the \"kernel\" component. a buffer overflow allows attackers to execute arbitrary code in a privileged context via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-04-02\nLast Modified Date: 2019-03-08", "role": "assistant" } ]
CWE Code: 459 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Incomplete Cleanup Summary: an issue was discovered in xen through 4.11.x on amd x86 platforms, possibly allowing guest os users to gain host os privileges because tlb flushes do not always occur after iommu mapping changes. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-12-08 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incomplete Cleanup.", "role": "user" }, { "content": "CWE Code: 459\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Incomplete Cleanup\nSummary: an issue was discovered in xen through 4.11.x on amd x86 platforms, possibly allowing guest os users to gain host os privileges because tlb flushes do not always occur after iommu mapping changes.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-12-08\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in default.asp in mydesign sayac 2.0 allow remote attackers to execute arbitrary sql commands via (1) the user parameter (aka username field) or (2) the pass parameter (aka pass field) to (a) admin/admin.asp or (b) the default uri under admin/. note: some of these details are obtained from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-02-10 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in default.asp in mydesign sayac 2.0 allow remote attackers to execute arbitrary sql commands via (1) the user parameter (aka username field) or (2) the pass parameter (aka pass field) to (a) admin/admin.asp or (b) the default uri under admin/. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-10\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the t3m e-mail marketing tool (t3m) extension 0.2.4 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-07-28 Last Modified Date: 2010-07-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the t3m e-mail marketing tool (t3m) extension 0.2.4 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-07-28\nLast Modified Date: 2010-07-28", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in login.php in the smnews example script for txtsql 2.2 final allows remote attackers to execute arbitrary sql commands via the username parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-03-02 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in login.php in the smnews example script for txtsql 2.2 final allows remote attackers to execute arbitrary sql commands via the username parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-02\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: buffer overflow in the ftp client in ibm aix 5.3 sp6 and 5.2.0 allows local users to execute arbitrary code via unspecified vectors that trigger the overflow in a gets function call. note: the client is setuid root on aix, so this issue crosses privilege boundaries. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2007-07-26 Last Modified Date: 2017-07-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in the ftp client in ibm aix 5.3 sp6 and 5.2.0 allows local users to execute arbitrary code via unspecified vectors that trigger the overflow in a gets function call. note: the client is setuid root on aix, so this issue crosses privilege boundaries.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2007-07-26\nLast Modified Date: 2017-07-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in the executequeries function in private/system/classes/listfactory.class.php in glfusion 1.1.2 and earlier allow remote attackers to execute arbitrary sql commands via the (1) order and (2) direction parameters to search.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-04-22 Last Modified Date: 2018-10-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the executequeries function in private/system/classes/listfactory.class.php in glfusion 1.1.2 and earlier allow remote attackers to execute arbitrary sql commands via the (1) order and (2) direction parameters to search.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-04-22\nLast Modified Date: 2018-10-10", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the david castro authcas module (authcas.pm) 0.4 for the apache http server allows remote attackers to execute arbitrary sql commands via the session_cookie_name (session id) in a cookie. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-12-13 Last Modified Date: 2018-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the david castro authcas module (authcas.pm) 0.4 for the apache http server allows remote attackers to execute arbitrary sql commands via the session_cookie_name (session id) in a cookie.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-12-13\nLast Modified Date: 2018-10-15", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allow local users to gain privileges via a crafted application, aka "win32k elevation of privilege vulnerability." Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-11-10 Last Modified Date: 2018-10-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the kernel-mode drivers in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, windows 10 gold, 1511, and 1607, and windows server 2016 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-11-10\nLast Modified Date: 2018-10-12", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: heap-based buffer overflow in the usb backend in cups in apple mac os x 10.5.8 allows local users to gain privileges via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2009-09-14 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: heap-based buffer overflow in the usb backend in cups in apple mac os x 10.5.8 allows local users to gain privileges via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2009-09-14\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: the kernel-mode driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka "win32k elevation of privilege vulnerability," a different vulnerability than cve-2016-0165 and cve-2016-0167. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-04-12 Last Modified Date: 2018-10-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the kernel-mode driver in microsoft windows vista sp2, windows server 2008 sp2 and r2 sp1, windows 7 sp1, windows 8.1, windows server 2012 gold and r2, windows rt 8.1, and windows 10 gold and 1511 allows local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-0165 and cve-2016-0167.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-04-12\nLast Modified Date: 2018-10-12", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: the default d-bus access control rule in midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-01-26 Last Modified Date: 2018-10-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the default d-bus access control rule in midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-01-26\nLast Modified Date: 2018-10-30", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in album.php in alstrasoft video share enterprise 4.51 allows remote attackers to execute arbitrary sql commands via the uid parameter, a different vector than cve-2007-4086. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-07-30 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in album.php in alstrasoft video share enterprise 4.51 allows remote attackers to execute arbitrary sql commands via the uid parameter, a different vector than cve-2007-4086.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-07-30\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in siteadmin/forgot.php in php jobwebsite pro allows remote attackers to execute arbitrary sql commands via the adname parameter in a submit action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-01-27 Last Modified Date: 2017-08-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in siteadmin/forgot.php in php jobwebsite pro allows remote attackers to execute arbitrary sql commands via the adname parameter in a submit action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-01-27\nLast Modified Date: 2017-08-08", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Information Exposure Summary: in lg's laf component, there is a possible leak of information in a protected disk partition due to a missing bounds check. this could lead to local information disclosure via usb with user execution privileges needed. user interaction is not required for exploitation.product: androidversions: android kernelandroid id: a-68771598 Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-09-27 Last Modified Date: 2019-10-02
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Information Exposure\nSummary: in lg's laf component, there is a possible leak of information in a protected disk partition due to a missing bounds check. this could lead to local information disclosure via usb with user execution privileges needed. user interaction is not required for exploitation.product: androidversions: android kernelandroid id: a-68771598\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-02", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in help-details.php in clscript classifieds script allows remote attackers to execute arbitrary sql commands via the hpid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-05-03 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in help-details.php in clscript classifieds script allows remote attackers to execute arbitrary sql commands via the hpid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-05-03\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 254 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: 7PK - Security Features Summary: a security design issue can allow an unprivileged user to interact with the carbon black sensor and perform unauthorized actions. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-02-19 Last Modified Date: 2018-03-21
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: 7PK - Security Features.", "role": "user" }, { "content": "CWE Code: 254\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: 7PK - Security Features\nSummary: a security design issue can allow an unprivileged user to interact with the carbon black sensor and perform unauthorized actions.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-02-19\nLast Modified Date: 2018-03-21", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Information Exposure Summary: vulnerability in the oracle weblogic server component of oracle fusion middleware (subcomponent: web container). supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle weblogic server. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle weblogic server accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2017-10-19 Last Modified Date: 2017-10-23
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: vulnerability in the oracle weblogic server component of oracle fusion middleware (subcomponent: web container). supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle weblogic server. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle weblogic server accessible data. cvss 3.0 base score 6.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-10-19\nLast Modified Date: 2017-10-23", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in index.php in oneorzero aims 2.6.0 members edition and 2.7.0 trial edition allow remote authenticated users to execute arbitrary sql commands via the (1) id parameter in a saved_search action and (2) item_types parameter in a show_item_search action in the search_management_manage subcontroller. note: some of these details are obtained from third party information. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-09-14 Last Modified Date: 2012-02-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in oneorzero aims 2.6.0 members edition and 2.7.0 trial edition allow remote authenticated users to execute arbitrary sql commands via the (1) id parameter in a saved_search action and (2) item_types parameter in a show_item_search action in the search_management_manage subcontroller. note: some of these details are obtained from third party information.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-09-14\nLast Modified Date: 2012-02-14", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in liga.php in h&h websoccer 2.80 allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-11-13 Last Modified Date: 2017-08-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in liga.php in h&h websoccer 2.80 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-11-13\nLast Modified Date: 2017-08-08", "role": "assistant" } ]
CWE Code: 732 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Incorrect Permission Assignment for Critical Resource Summary: cms made simple (cmsms) 2.2.7 contains a privilege escalation vulnerability from ordinary user to admin user by arranging for the eff_uid value within $_cookie[$this->_loginkey] to equal 1, because files in the tmp/ directory are accessible through http requests. note: this vulnerability exists because of an incorrect fix for cve-2018-10084. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-04-27 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.", "role": "user" }, { "content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: cms made simple (cmsms) 2.2.7 contains a privilege escalation vulnerability from ordinary user to admin user by arranging for the eff_uid value within $_cookie[$this->_loginkey] to equal 1, because files in the tmp/ directory are accessible through http requests. note: this vulnerability exists because of an incorrect fix for cve-2018-10084.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-04-27\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 400 Vulnerability Type: privilege_escalation CVSS Score: 7.1 CWE Name: Uncontrolled Resource Consumption Summary: in libstagefright, there is a possible resource exhaustion due to a missing bounds check. this could lead to remote denial of service with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-111450210 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2019-09-27 Last Modified Date: 2019-09-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Uncontrolled Resource Consumption.", "role": "user" }, { "content": "CWE Code: 400\nVulnerability Type: privilege_escalation\nCVSS Score: 7.1\nCWE Name: Uncontrolled Resource Consumption\nSummary: in libstagefright, there is a possible resource exhaustion due to a missing bounds check. this could lead to remote denial of service with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-111450210\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in includes/funcs_vendors.php in censura 1.15.04, and other versions before 1.16.04, allows remote attackers to execute arbitrary sql commands via the vendorid parameter in a vendor_info cmd action to censura.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-05-14 Last Modified Date: 2017-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in includes/funcs_vendors.php in censura 1.15.04, and other versions before 1.16.04, allows remote attackers to execute arbitrary sql commands via the vendorid parameter in a vendor_info cmd action to censura.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-05-14\nLast Modified Date: 2017-10-11", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sugarcrm before 8.0.4 and 9.x before 9.0.2 allows sql injection in the history function by a regular user. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-10-07 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sugarcrm before 8.0.4 and 9.x before 9.0.2 allows sql injection in the history function by a regular user.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-10-07\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: the bluetooth hci interface in apple os x before 10.11.2 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-12-11 Last Modified Date: 2017-09-13
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the bluetooth hci interface in apple os x before 10.11.2 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-12-11\nLast Modified Date: 2017-09-13", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Permissions Privileges and Access Controls Summary: there is a vulnerability with the dolby dax2 api system services in which a low-privileged user can terminate arbitrary processes that are running at a higher privilege. the following are affected products and versions: legion y520t_z370 6.0.1.8642, aio310-20iap 6.0.1.8642, aio510-22ish 6.0.1.8642, aio510-23ish 6.0.1.8642, aio520-22ikl 6.0.1.8642, aio520-22iku 6.0.1.8642, aio520-24ikl 6.0.1.8642, aio520-24iku 6.0.1.8642, aio520-27ikl 6.0.1.8642, aio720-24ikb 6.0.1.8642, ideacentre 520s-23iku 6.0.1.8642, thinkcentre m700z 6.0.1.8642, thinkcentre m800z 6.0.1.8642, thinkcentre m810z 6.0.1.8642, thinkcentre m818z 6.0.1.8642, thinkcentre m900z 6.0.1.8642, thinkcentre m910z 6.0.1.8642, v410z(yt s4250) 6.0.1.8642, 330-14ikbr win10:6.0.1.8652, 330-15ikbr win10:6.0.1.8652, 330-15ikbr (brazil) win10:6.0.1.8652, 330-15ikbr touch win10:6.0.1.8652, 330-17ikbr win10:6.0.1.8652, yoga 730-13ikb win10:6.0.1.8644, yoga 730-15ikb win10:6.0.1.8644, thinkpad l560 6.0.1.8644 and 6.0.1.8652, thinkpad l570 6.0.1.8644 and 6.0.1.8652, thinkpad p50 6.0.1.8642, thinkpad p50s 6.0.1.8642, thinkpad p51s (20jx, 20kx) 6.0.1.8642, thinkpad p51s (20hx) 6.0.1.8642, thinkpad p52s 6.0.1.8642, thinkpad p70 6.0.1.8642, thinkpad t25 6.0.1.8642, thinkpad t460s 6.0.1.8642, thinkpad t470 6.0.1.8642, thinkpad t470s 6.0.1.8642, thinkpad t480 6.0.1.8642, thinkpad t480s 6.0.1.8642, thinkpad t560 6.0.1.8642, thinkpad t570 6.0.1.8642, thinkpad t580 6.0.1.8642, thinkpad x1 carbon 8.66.76.72 and 8.66.68.54, thinkpad x1 carbon 6th 6.0.1.8642, thinkpad x1 carbon, x1 yoga 8.66.62.92 and 8.66.62.54, thinkpad x1 tablet (20gx) 6.0.1.8642, thinkpad x1 tablet (20jx) 6.0.1.8642, thinkpad x1 tablet gen 3 6.0.1.8642, thinkpad x1 yoga (20jx) 8.66.88.60, thinkpad x1 yoga 3rd 6.0.1.8642, thinkpad x280 6.0.1.8642, thinkpad yoga 260, s1 8.66.62.92 and 8.66.62.54. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2019-08-29 Last Modified Date: 2019-09-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: there is a vulnerability with the dolby dax2 api system services in which a low-privileged user can terminate arbitrary processes that are running at a higher privilege. the following are affected products and versions: legion y520t_z370 6.0.1.8642, aio310-20iap 6.0.1.8642, aio510-22ish 6.0.1.8642, aio510-23ish 6.0.1.8642, aio520-22ikl 6.0.1.8642, aio520-22iku 6.0.1.8642, aio520-24ikl 6.0.1.8642, aio520-24iku 6.0.1.8642, aio520-27ikl 6.0.1.8642, aio720-24ikb 6.0.1.8642, ideacentre 520s-23iku 6.0.1.8642, thinkcentre m700z 6.0.1.8642, thinkcentre m800z 6.0.1.8642, thinkcentre m810z 6.0.1.8642, thinkcentre m818z 6.0.1.8642, thinkcentre m900z 6.0.1.8642, thinkcentre m910z 6.0.1.8642, v410z(yt s4250) 6.0.1.8642, 330-14ikbr win10:6.0.1.8652, 330-15ikbr win10:6.0.1.8652, 330-15ikbr (brazil) win10:6.0.1.8652, 330-15ikbr touch win10:6.0.1.8652, 330-17ikbr win10:6.0.1.8652, yoga 730-13ikb win10:6.0.1.8644, yoga 730-15ikb win10:6.0.1.8644, thinkpad l560 6.0.1.8644 and 6.0.1.8652, thinkpad l570 6.0.1.8644 and 6.0.1.8652, thinkpad p50 6.0.1.8642, thinkpad p50s 6.0.1.8642, thinkpad p51s (20jx, 20kx) 6.0.1.8642, thinkpad p51s (20hx) 6.0.1.8642, thinkpad p52s 6.0.1.8642, thinkpad p70 6.0.1.8642, thinkpad t25 6.0.1.8642, thinkpad t460s 6.0.1.8642, thinkpad t470 6.0.1.8642, thinkpad t470s 6.0.1.8642, thinkpad t480 6.0.1.8642, thinkpad t480s 6.0.1.8642, thinkpad t560 6.0.1.8642, thinkpad t570 6.0.1.8642, thinkpad t580 6.0.1.8642, thinkpad x1 carbon 8.66.76.72 and 8.66.68.54, thinkpad x1 carbon 6th 6.0.1.8642, thinkpad x1 carbon, x1 yoga 8.66.62.92 and 8.66.62.54, thinkpad x1 tablet (20gx) 6.0.1.8642, thinkpad x1 tablet (20jx) 6.0.1.8642, thinkpad x1 tablet gen 3 6.0.1.8642, thinkpad x1 yoga (20jx) 8.66.88.60, thinkpad x1 yoga 3rd 6.0.1.8642, thinkpad x280 6.0.1.8642, thinkpad yoga 260, s1 8.66.62.92 and 8.66.62.54.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2019-08-29\nLast Modified Date: 2019-09-04", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in form.php in the formcraft plugin 1.3.7 and earlier for wordpress allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2013-12-20 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in form.php in the formcraft plugin 1.3.7 and earlier for wordpress allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-12-20\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 255 Vulnerability Type: privilege_escalation CVSS Score: 7.9 CWE Name: Credentials Management Summary: the web management interface on mediabridge medialink mwn-wapr300n devices with firmware 5.07.50 has a default password of admin for the admin account and a default password of password for the medialink account, which allows remote attackers to obtain administrative privileges by leveraging a wi-fi session. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: ADJACENT_NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-12-31 Last Modified Date: 2015-12-31
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Credentials Management.", "role": "user" }, { "content": "CWE Code: 255\nVulnerability Type: privilege_escalation\nCVSS Score: 7.9\nCWE Name: Credentials Management\nSummary: the web management interface on mediabridge medialink mwn-wapr300n devices with firmware 5.07.50 has a default password of admin for the admin account and a default password of password for the medialink account, which allows remote attackers to obtain administrative privileges by leveraging a wi-fi session.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-12-31\nLast Modified Date: 2015-12-31", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Permissions Privileges and Access Controls Summary: an elevation of privilege vulnerability in the qualcomm video driver. product: android. versions: android kernel. android id: a-34389926. references: qc-cr#897452. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-04-04 Last Modified Date: 2018-05-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability in the qualcomm video driver. product: android. versions: android kernel. android id: a-34389926. references: qc-cr#897452.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-04-04\nLast Modified Date: 2018-05-04", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the hbook (h_book) extension 2.3.0 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-03-13 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the hbook (h_book) extension 2.3.0 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-13\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 787 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Out-of-bounds Write Summary: in lpptransposer of lpp_tran.cpp there is a possible out of bounds write due to missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9. android id: a-112160868. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-12-06 Last Modified Date: 2019-01-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Write.", "role": "user" }, { "content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Out-of-bounds Write\nSummary: in lpptransposer of lpp_tran.cpp there is a possible out of bounds write due to missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: android. versions: android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android-9. android id: a-112160868.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-12-06\nLast Modified Date: 2019-01-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in print.php in the am events (aka amevents) module 0.22 for xoops allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-12-30 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in print.php in the am events (aka amevents) module 0.22 for xoops allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-12-30\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Improper Input Validation Summary: windows hyper-v in windows 10 1607, 1703, and windows server 2016 allows a denial of service vulnerability when it fails to properly validate input from a privileged user on a guest operating system, aka "windows hyper-v denial of service vulnerability". Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2017-08-08 Last Modified Date: 2017-08-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Input Validation\nSummary: windows hyper-v in windows 10 1607, 1703, and windows server 2016 allows a denial of service vulnerability when it fails to properly validate input from a privileged user on a guest operating system, aka \"windows hyper-v denial of service vulnerability\".\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2017-08-08\nLast Modified Date: 2017-08-14", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in admin/index.php in w3b>cms (aka w3blabor cms) before 3.4.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the benutzername parameter (aka username field) in a login action. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-02-16 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in admin/index.php in w3b>cms (aka w3blabor cms) before 3.4.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the benutzername parameter (aka username field) in a login action.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-16\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in the prince clan chess club (com_pcchess) 0.8 and earlier component for joomla! allows remote attackers to execute arbitrary sql commands via the user_id parameter in a players action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-02-13 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the prince clan chess club (com_pcchess) 0.8 and earlier component for joomla! allows remote attackers to execute arbitrary sql commands via the user_id parameter in a players action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-13\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 522 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Insufficiently Protected Credentials Summary: sera 1.2 stores the user's login password in plain text in their home directory. this makes privilege escalation trivial and also exposes the user and system keychains to local attacks. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2017-11-01 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Insufficiently Protected Credentials.", "role": "user" }, { "content": "CWE Code: 522\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Insufficiently Protected Credentials\nSummary: sera 1.2 stores the user's login password in plain text in their home directory. this makes privilege escalation trivial and also exposes the user and system keychains to local attacks.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-11-01\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in forum_duzen.php in phpkf allows remote attackers to execute arbitrary sql commands via the fno parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-03-09 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in forum_duzen.php in phpkf allows remote attackers to execute arbitrary sql commands via the fno parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-09\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 5.0 CWE Name: Information Exposure Summary: the web-based administrative interface in cisco webex meeting center provides different error messages for failed login attempts depending on whether the username exists or corresponds to a privileged account, which allows remote attackers to enumerate account names and obtain sensitive information via a series of requests, aka bug id cscuf28861. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2015-06-19 Last Modified Date: 2016-12-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Information Exposure\nSummary: the web-based administrative interface in cisco webex meeting center provides different error messages for failed login attempts depending on whether the username exists or corresponds to a privileged account, which allows remote attackers to enumerate account names and obtain sensitive information via a series of requests, aka bug id cscuf28861.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2015-06-19\nLast Modified Date: 2016-12-28", "role": "assistant" } ]