text
stringlengths
365
3.97k
conversations
listlengths
3
3
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: whatsns 4.0 allows index.php?question/ajaxadd.html title sql injection. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-04-22 Last Modified Date: 2019-04-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: whatsns 4.0 allows index.php?question/ajaxadd.html title sql injection.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-04-22\nLast Modified Date: 2019-04-22", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: a sql injection vulnerability exists in the zoho manageengine applications manager 13 before build 13820 via the resids parameter in a /editdisplaynames.do?method=editdisplaynames get request. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-08-08 Last Modified Date: 2018-10-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection vulnerability exists in the zoho manageengine applications manager 13 before build 13820 via the resids parameter in a /editdisplaynames.do?method=editdisplaynames get request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-08-08\nLast Modified Date: 2018-10-05", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Improper Privilege Management Summary: cybozu office 10.0.0 to 10.8.0 allows authenticated attackers to bypass authentication to obtain the schedules without access privilege via unspecified vectors. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2018-06-26 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Privilege Management\nSummary: cybozu office 10.0.0 to 10.8.0 allows authenticated attackers to bypass authentication to obtain the schedules without access privilege via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-06-26\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Permissions Privileges and Access Controls Summary: openstack identity (keystone) before 2014.1.1 does not properly handle when a role is assigned to a group that has the same id as a user, which allows remote authenticated users to gain privileges that are assigned to a group with the same id. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2014-11-03 Last Modified Date: 2014-11-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: openstack identity (keystone) before 2014.1.1 does not properly handle when a role is assigned to a group that has the same id as a user, which allows remote authenticated users to gain privileges that are assigned to a group with the same id.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-11-03\nLast Modified Date: 2014-11-04", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the random prayer 2 (ste_prayer2) extension 0.0.3 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-12-22 Last Modified Date: 2009-12-23
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the random prayer 2 (ste_prayer2) extension 0.0.3 and earlier for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-22\nLast Modified Date: 2009-12-23", "role": "assistant" } ]
CWE Code: 125 Vulnerability Type: privilege_escalation CVSS Score: 1.9 CWE Name: Out-of-bounds Read Summary: in nfc, there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-121263487 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-09-27 Last Modified Date: 2019-10-02
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Read.", "role": "user" }, { "content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 1.9\nCWE Name: Out-of-bounds Read\nSummary: in nfc, there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-121263487\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-02", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: multiple buffer overflows in active management technology (amt) in intel manageability engine firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with amt execution privilege. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-11-21 Last Modified Date: 2018-05-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: multiple buffer overflows in active management technology (amt) in intel manageability engine firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with amt execution privilege.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-11-21\nLast Modified Date: 2018-05-11", "role": "assistant" } ]
CWE Code: 798 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Use of Hard-coded Credentials Summary: hard-coded credentials in amosconnect 8 allow remote attackers to gain full administrative privileges, including the ability to execute commands on the microsoft windows host platform with system privileges by abusing amosconnect task manager. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-07-22 Last Modified Date: 2017-10-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Use of Hard-coded Credentials.", "role": "user" }, { "content": "CWE Code: 798\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Use of Hard-coded Credentials\nSummary: hard-coded credentials in amosconnect 8 allow remote attackers to gain full administrative privileges, including the ability to execute commands on the microsoft windows host platform with system privileges by abusing amosconnect task manager.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-07-22\nLast Modified Date: 2017-10-29", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 2.1 CWE Name: Improper Access Control Summary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.32 and prior to 6.0.10. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial dos) of oracle vm virtualbox. cvss 3.0 base score 3.3 (availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:n/i:n/a:l). Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2019-07-23 Last Modified Date: 2019-07-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.32 and prior to 6.0.10. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial dos) of oracle vm virtualbox. cvss 3.0 base score 3.3 (availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:n/i:n/a:l).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-07-23\nLast Modified Date: 2019-07-30", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 8.5 CWE Name: Permissions Privileges and Access Controls Summary: misys fusioncapital opics plus allows remote authenticated users to gain privileges via a man-in-the-middle attack that modifies the xmlmessageout parameter. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-07-19 Last Modified Date: 2016-11-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 8.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: misys fusioncapital opics plus allows remote authenticated users to gain privileges via a man-in-the-middle attack that modifies the xmlmessageout parameter.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-19\nLast Modified Date: 2016-11-28", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 6.5 CWE Name: Improper Input Validation Summary: a vulnerability in the web-based management interface of cisco identity services engine (ise) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device with the privileges of the web server. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-10-05 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Input Validation\nSummary: a vulnerability in the web-based management interface of cisco identity services engine (ise) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device with the privileges of the web server.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-10-05\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Improper Privilege Management Summary: vulnerability in the oracle hospitality reporting and analytics component of oracle hospitality applications (subcomponent: reporting). supported versions that are affected are 8.5.1 and 9.0.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle hospitality reporting and analytics. while the vulnerability is in oracle hospitality reporting and analytics, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of oracle hospitality reporting and analytics. cvss 3.0 base score 7.7 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:c/c:n/i:n/a:h). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2017-08-08 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Privilege Management\nSummary: vulnerability in the oracle hospitality reporting and analytics component of oracle hospitality applications (subcomponent: reporting). supported versions that are affected are 8.5.1 and 9.0.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle hospitality reporting and analytics. while the vulnerability is in oracle hospitality reporting and analytics, attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of oracle hospitality reporting and analytics. cvss 3.0 base score 7.7 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:c/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2017-08-08\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 310 Vulnerability Type: privilege_escalation CVSS Score: 8.5 CWE Name: Cryptographic Issues Summary: the pe_mcollective module in puppet enterprise (pe) before 2.7.1 does not properly restrict access to a catalog of private ssl keys, which allows remote authenticated users to obtain sensitive information and gain privileges by leveraging root access to a node, related to the master role. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2014-03-14 Last Modified Date: 2019-07-10
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Cryptographic Issues.", "role": "user" }, { "content": "CWE Code: 310\nVulnerability Type: privilege_escalation\nCVSS Score: 8.5\nCWE Name: Cryptographic Issues\nSummary: the pe_mcollective module in puppet enterprise (pe) before 2.7.1 does not properly restrict access to a catalog of private ssl keys, which allows remote authenticated users to obtain sensitive information and gain privileges by leveraging root access to a node, related to the master role.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2014-03-14\nLast Modified Date: 2019-07-10", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Permissions Privileges and Access Controls Summary: an elevation of privilege vulnerability exists in the way that the unistore.dll handles objects in memory, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1173, cve-2019-1174, cve-2019-1175, cve-2019-1177, cve-2019-1178, cve-2019-1180, cve-2019-1184, cve-2019-1186. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-08-14 Last Modified Date: 2019-08-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability exists in the way that the unistore.dll handles objects in memory, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1173, cve-2019-1174, cve-2019-1175, cve-2019-1177, cve-2019-1178, cve-2019-1180, cve-2019-1184, cve-2019-1186.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-14\nLast Modified Date: 2019-08-19", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in moa gallery 1.1.0 and 1.2.0 allows remote attackers to execute arbitrary sql commands via the gallery_id parameter in a gallery_view action. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-11-18 Last Modified Date: 2017-09-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in moa gallery 1.1.0 and 1.2.0 allows remote attackers to execute arbitrary sql commands via the gallery_id parameter in a gallery_view action.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-11-18\nLast Modified Date: 2017-09-19", "role": "assistant" } ]
CWE Code: 404 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Resource Shutdown or Release Summary: an elevation of privilege vulnerability exists in the way that the microsoft remotefx virtual gpu miniport driver handles objects in memory, aka "microsoft remotefx virtual gpu miniport driver elevation of privilege vulnerability." this affects windows server 2016, windows 10, windows 8.1, windows 7, windows server 2019. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-11-14 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Resource Shutdown or Release.", "role": "user" }, { "content": "CWE Code: 404\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Resource Shutdown or Release\nSummary: an elevation of privilege vulnerability exists in the way that the microsoft remotefx virtual gpu miniport driver handles objects in memory, aka \"microsoft remotefx virtual gpu miniport driver elevation of privilege vulnerability.\" this affects windows server 2016, windows 10, windows 8.1, windows 7, windows server 2019.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-11-14\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Permissions Privileges and Access Controls Summary: the repair permissions tool in disk utility in apple mac os x 10.4.11 adds the setuid bit to the emacs executable file, which allows local users to gain privileges by executing commands within emacs. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-08-04 Last Modified Date: 2017-08-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: the repair permissions tool in disk utility in apple mac os x 10.4.11 adds the setuid bit to the emacs executable file, which allows local users to gain privileges by executing commands within emacs.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-04\nLast Modified Date: 2017-08-08", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the multishop extension before 2.0.39 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2013-06-25 Last Modified Date: 2013-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the multishop extension before 2.0.39 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-06-25\nLast Modified Date: 2013-10-11", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: a vulnerability in the london trust media private internet access (pia) vpn client v82 for linux could allow an authenticated, local attacker to run arbitrary code with elevated privileges. the openvpn_launcher.64 binary is setuid root. this binary executes /opt/pia/openvpn-64/openvpn, passing the parameters provided from the command line. care was taken to programmatically disable potentially dangerous openvpn parameters; however, the --route-pre-down parameter can be used. this parameter accepts an arbitrary path to a script/program to be executed when openvpn exits. the --script-security parameter also needs to be passed to allow for this action to be taken, and --script-security is not currently in the disabled parameter list. a local unprivileged user can pass a malicious script/binary to the --route-pre-down option, which will be executed as root when openvpn is stopped. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-07-11 Last Modified Date: 2019-07-16
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: a vulnerability in the london trust media private internet access (pia) vpn client v82 for linux could allow an authenticated, local attacker to run arbitrary code with elevated privileges. the openvpn_launcher.64 binary is setuid root. this binary executes /opt/pia/openvpn-64/openvpn, passing the parameters provided from the command line. care was taken to programmatically disable potentially dangerous openvpn parameters; however, the --route-pre-down parameter can be used. this parameter accepts an arbitrary path to a script/program to be executed when openvpn exits. the --script-security parameter also needs to be passed to allow for this action to be taken, and --script-security is not currently in the disabled parameter list. a local unprivileged user can pass a malicious script/binary to the --route-pre-down option, which will be executed as root when openvpn is stopped.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-07-11\nLast Modified Date: 2019-07-16", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Permissions Privileges and Access Controls Summary: hald in sun opensolaris snv_51 through snv_130 does not have the proc_audit privilege during unspecified attempts to write to the auditing log, which makes it easier for physically proximate attackers to avoid detection of changes to the set of connected hardware devices supporting the hardware abstraction layer (hal) specification. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-01-08 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: hald in sun opensolaris snv_51 through snv_130 does not have the proc_audit privilege during unspecified attempts to write to the auditing log, which makes it easier for physically proximate attackers to avoid detection of changes to the set of connected hardware devices supporting the hardware abstraction layer (hal) specification.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-01-08\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 732 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Incorrect Permission Assignment for Critical Resource Summary: a vulnerability in one of the diagnostic test cli commands on cisco industrial ethernet 4010 series switches running cisco ios software could allow an authenticated, local attacker to impact the stability of the device. this could result in arbitrary code execution or a denial of service (dos) condition. the attacker has to have valid user credentials at privilege level 15. the vulnerability is due to a diagnostic test cli command that allows the attacker to write to the device memory. an attacker could exploit this vulnerability by authenticating to the targeted device and issuing a specific diagnostic test command at the cli. an exploit could allow the attacker to overwrite system memory locations, which could have a negative impact on the stability of the device. cisco bug ids: cscvf71150. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-01-18 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.", "role": "user" }, { "content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: a vulnerability in one of the diagnostic test cli commands on cisco industrial ethernet 4010 series switches running cisco ios software could allow an authenticated, local attacker to impact the stability of the device. this could result in arbitrary code execution or a denial of service (dos) condition. the attacker has to have valid user credentials at privilege level 15. the vulnerability is due to a diagnostic test cli command that allows the attacker to write to the device memory. an attacker could exploit this vulnerability by authenticating to the targeted device and issuing a specific diagnostic test command at the cli. an exploit could allow the attacker to overwrite system memory locations, which could have a negative impact on the stability of the device. cisco bug ids: cscvf71150.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-01-18\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.8 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in class/page.php in farsi script (aka fascript) faname 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter. note: this might be the same issue as cve-2008-0328. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-07-09 Last Modified Date: 2008-09-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in class/page.php in farsi script (aka fascript) faname 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter. note: this might be the same issue as cve-2008-0328.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-07-09\nLast Modified Date: 2008-09-05", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in ruby on rails before 2.1.1 allow remote attackers to execute arbitrary sql commands via the (1) :limit and (2) :offset parameters, related to activerecord, activesupport, activeresource, actionpack, and actionmailer. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-09-30 Last Modified Date: 2019-08-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in ruby on rails before 2.1.1 allow remote attackers to execute arbitrary sql commands via the (1) :limit and (2) :offset parameters, related to activerecord, activesupport, activeresource, actionpack, and actionmailer.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-09-30\nLast Modified Date: 2019-08-08", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: /view/friend_profile.php in ingenious school management system 2.3.0 is vulnerable to boolean-based and time-based sql injection in the 'friend_index' parameter of a get request. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-11-07 Last Modified Date: 2017-11-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: /view/friend_profile.php in ingenious school management system 2.3.0 is vulnerable to boolean-based and time-based sql injection in the 'friend_index' parameter of a get request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-11-07\nLast Modified Date: 2017-11-29", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Improper Access Control Summary: the virconnectgetdomaincapabilities() libvirt api, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. since v1.2.19, libvirt will execute that program to probe the domain's capabilities. read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-08-02 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Access Control\nSummary: the virconnectgetdomaincapabilities() libvirt api, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an \"emulatorbin\" argument to specify the program providing emulation for a domain. since v1.2.19, libvirt will execute that program to probe the domain's capabilities. read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-02\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 415 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Double Free Summary: the grant-table feature in xen through 4.8.x has a race condition leading to a double free, which allows guest os users to cause a denial of service (memory consumption), or possibly obtain sensitive information or gain privileges, aka xsa-218 bug 2. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-07-05 Last Modified Date: 2017-11-04
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Double Free.", "role": "user" }, { "content": "CWE Code: 415\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Double Free\nSummary: the grant-table feature in xen through 4.8.x has a race condition leading to a double free, which allows guest os users to cause a denial of service (memory consumption), or possibly obtain sensitive information or gain privileges, aka xsa-218 bug 2.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-07-05\nLast Modified Date: 2017-11-04", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in includes/update.php in the support ticket system plugin before 1.2.1 for wordpress allow remote attackers to execute arbitrary sql commands via the (1) user or (2) id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-09-26 Last Modified Date: 2018-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in includes/update.php in the support ticket system plugin before 1.2.1 for wordpress allow remote attackers to execute arbitrary sql commands via the (1) user or (2) id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-09-26\nLast Modified Date: 2018-10-09", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: buffer overflow in mostgear soft easy lan folder share 3.2.0.100 allows local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string in the (1) registration code field in the activate license window or the (2) hklm\software\mostgear\easylanfoldershare_v1\license registry key. note: it is not clear from the original report whether this issue crosses privilege boundaries. if not, then it should not be included in cve. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2013-10-11 Last Modified Date: 2013-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in mostgear soft easy lan folder share 3.2.0.100 allows local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string in the (1) registration code field in the activate license window or the (2) hklm\\software\\mostgear\\easylanfoldershare_v1\\license registry key. note: it is not clear from the original report whether this issue crosses privilege boundaries. if not, then it should not be included in cve.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-10-11\nLast Modified Date: 2013-10-15", "role": "assistant" } ]
CWE Code: 835 Vulnerability Type: privilege_escalation CVSS Score: 7.8 CWE Name: Loop with Unreachable Exit Condition ('Infinite Loop') Summary: in ihevcd_decode.c there is a possible infinite loop due to bytes for an sps of unsupported resolution resulting in the same sps being fed in over and over. this could lead to a remote denial of service of a critical system process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. android id: a-65718319. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/NONE/COMPLETE Published Date: 2018-01-12 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Loop with Unreachable Exit Condition ('Infinite Loop').", "role": "user" }, { "content": "CWE Code: 835\nVulnerability Type: privilege_escalation\nCVSS Score: 7.8\nCWE Name: Loop with Unreachable Exit Condition ('Infinite Loop')\nSummary: in ihevcd_decode.c there is a possible infinite loop due to bytes for an sps of unsupported resolution resulting in the same sps being fed in over and over. this could lead to a remote denial of service of a critical system process with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. android id: a-65718319.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2018-01-12\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: the tree list functionality in the photo gallery application in asustor adm 3.1.0.rfq3 has a sql injection vulnerability that affects the 'album_id' or 'scope' parameter via a photo-gallery/api/album/tree_lists/ uri. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-08-16 Last Modified Date: 2018-10-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the tree list functionality in the photo gallery application in asustor adm 3.1.0.rfq3 has a sql injection vulnerability that affects the 'album_id' or 'scope' parameter via a photo-gallery/api/album/tree_lists/ uri.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-08-16\nLast Modified Date: 2018-10-19", "role": "assistant" } ]
CWE Code: 862 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Missing Authorization Summary: a vulnerability in the start before logon (sbl) module of cisco anyconnect secure mobility client software for windows could allow an unauthenticated, local attacker to open internet explorer with the privileges of the system user. the vulnerability is due to insufficient implementation of the access controls. an attacker could exploit this vulnerability by opening the internet explorer browser. an exploit could allow the attacker to use internet explorer with the privileges of the system user. this may allow the attacker to execute privileged commands on the targeted system. this vulnerability affects versions prior to released versions 4.4.00243 and later and 4.3.05017 and later. cisco bug ids: cscvc43976. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-02-09 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Missing Authorization.", "role": "user" }, { "content": "CWE Code: 862\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Missing Authorization\nSummary: a vulnerability in the start before logon (sbl) module of cisco anyconnect secure mobility client software for windows could allow an unauthenticated, local attacker to open internet explorer with the privileges of the system user. the vulnerability is due to insufficient implementation of the access controls. an attacker could exploit this vulnerability by opening the internet explorer browser. an exploit could allow the attacker to use internet explorer with the privileges of the system user. this may allow the attacker to execute privileged commands on the targeted system. this vulnerability affects versions prior to released versions 4.4.00243 and later and 4.3.05017 and later. cisco bug ids: cscvc43976.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-02-09\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in request_account.php in billwerx rc 5.2.2 pl2 allows remote attackers to execute arbitrary sql commands via the primary_number parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-05-06 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in request_account.php in billwerx rc 5.2.2 pl2 allows remote attackers to execute arbitrary sql commands via the primary_number parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-05-06\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in cityview.php in tours manager 1.0 allows remote attackers to execute arbitrary sql commands via the cityid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-02-26 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in cityview.php in tours manager 1.0 allows remote attackers to execute arbitrary sql commands via the cityid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-26\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the browser - typo3 without php (browser) extension before 4.5.5 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2013-08-16 Last Modified Date: 2017-08-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the browser - typo3 without php (browser) extension before 4.5.5 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-08-16\nLast Modified Date: 2017-08-29", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, directly modifies /etc/passwd, which allows local users to cause a denial of service (inconsistent file state) by causing an error during the modification. note: this issue can be combined with cve-2015-3245 to gain privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-08-11 Last Modified Date: 2018-05-20
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, directly modifies /etc/passwd, which allows local users to cause a denial of service (inconsistent file state) by causing an error during the modification. note: this issue can be combined with cve-2015-3245 to gain privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-08-11\nLast Modified Date: 2018-05-20", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in go.php in scripts24 ipost 1.0.1 and itgp 1.0.4 allows remote attackers to execute arbitrary sql commands via the id parameter in a report action. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-08-06 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in go.php in scripts24 ipost 1.0.1 and itgp 1.0.4 allows remote attackers to execute arbitrary sql commands via the id parameter in a report action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-06\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in read.asp in jiro's faq manager experience 1.0 allows remote attackers to execute arbitrary sql commands via the fid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-06-13 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in read.asp in jiro's faq manager experience 1.0 allows remote attackers to execute arbitrary sql commands via the fid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-13\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 862 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Missing Authorization Summary: a vulnerability in sierra wireless airlink gx400, gx440, es440, and ls300 routers with firmware before 4.4.7 and gx450, es450, rv50, rv50x, mp70, and mp70e routers with firmware before 4.9.3 could allow an unauthenticated remote attacker to execute arbitrary code and gain full control of an affected system, including issuing commands with root privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-05-04 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Missing Authorization.", "role": "user" }, { "content": "CWE Code: 862\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Missing Authorization\nSummary: a vulnerability in sierra wireless airlink gx400, gx440, es440, and ls300 routers with firmware before 4.4.7 and gx450, es450, rv50, rv50x, mp70, and mp70e routers with firmware before 4.9.3 could allow an unauthenticated remote attacker to execute arbitrary code and gain full control of an affected system, including issuing commands with root privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-05-04\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 9.0 CWE Name: Permissions Privileges and Access Controls Summary: the oarsh script in oar before 2.5.7 allows remote authenticated users of a cluster to obtain sensitive information and possibly gain privileges via vectors related to openssh options. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-04-11 Last Modified Date: 2016-04-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Permissions Privileges and Access Controls\nSummary: the oarsh script in oar before 2.5.7 allows remote authenticated users of a cluster to obtain sensitive information and possibly gain privileges via vectors related to openssh options.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-04-11\nLast Modified Date: 2016-04-14", "role": "assistant" } ]
CWE Code: 22 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Summary: emc data protection advisor prior to 6.4 contains a path traversal vulnerability. a remote authenticated high privileged user may potentially exploit this vulnerability to access unauthorized information from the underlying os server by supplying specially crafted strings in input parameters of the application. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/NONE/NONE Published Date: 2017-07-09 Last Modified Date: 2017-07-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal').", "role": "user" }, { "content": "CWE Code: 22\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\nSummary: emc data protection advisor prior to 6.4 contains a path traversal vulnerability. a remote authenticated high privileged user may potentially exploit this vulnerability to access unauthorized information from the underlying os server by supplying specially crafted strings in input parameters of the application.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/NONE/NONE\nPublished Date: 2017-07-09\nLast Modified Date: 2017-07-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in admin/adminindex.php in turnkey web tools sunshop shopping cart 4.1.0 allow remote authenticated administrators to execute arbitrary sql commands via the (1) orderby and (2) sort parameters. note: the provenance of this information is unknown; the details are obtained solely from third party information. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-04-30 Last Modified Date: 2017-08-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in admin/adminindex.php in turnkey web tools sunshop shopping cart 4.1.0 allow remote authenticated administrators to execute arbitrary sql commands via the (1) orderby and (2) sort parameters. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-04-30\nLast Modified Date: 2017-08-08", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 10.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: an issue was discovered in zoho manageengine applications manager 11.0 through 14.0. an unauthenticated user can gain the authority of system on the server due to a popup_sla.jsp sid sql injection vulnerability. for example, the attacker can subsequently write arbitrary text to a .vbs file. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2019-04-22 Last Modified Date: 2019-05-06
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 10.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in zoho manageengine applications manager 11.0 through 14.0. an unauthenticated user can gain the authority of system on the server due to a popup_sla.jsp sid sql injection vulnerability. for example, the attacker can subsequently write arbitrary text to a .vbs file.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-04-22\nLast Modified Date: 2019-05-06", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in login.asp in natterchat 1.1 and 1.12 allow remote attackers to execute arbitrary sql commands via the (1) txtusername parameter (aka username) and (2) txtpassword parameter (aka password) in a form generated by home.asp. note: due to lack of details, it is not clear whether this is related to cve-2004-2206. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-08-24 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in login.asp in natterchat 1.1 and 1.12 allow remote attackers to execute arbitrary sql commands via the (1) txtusername parameter (aka username) and (2) txtpassword parameter (aka password) in a form generated by home.asp. note: due to lack of details, it is not clear whether this is related to cve-2004-2206.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-08-24\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in takefreestart.php in preprojects pre online tests generator pro allows remote attackers to execute arbitrary sql commands via the tid2 parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2011-03-23 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in takefreestart.php in preprojects pre online tests generator pro allows remote attackers to execute arbitrary sql commands via the tid2 parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-03-23\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 4.0 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: the configuration component of piwigo 2.9.2 is vulnerable to sql injection via the admin/configuration.php order_by array parameter. an attacker can exploit this to gain access to the data in a connected mysql database. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2017-12-21 Last Modified Date: 2018-01-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 4.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the configuration component of piwigo 2.9.2 is vulnerable to sql injection via the admin/configuration.php order_by array parameter. an attacker can exploit this to gain access to the data in a connected mysql database.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-12-21\nLast Modified Date: 2018-01-03", "role": "assistant" } ]
CWE Code: 362 Vulnerability Type: privilege_escalation CVSS Score: 6.9 CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Summary: race condition in nvmap in nvidia tegra linux kernel 3.10 allows local users to gain privileges via a crafted nvmap_ioc_create ioctl call, which triggers a use-after-free error, as demonstrated by using a race condition to escape the chrome sandbox. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-02-06 Last Modified Date: 2016-09-20
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').", "role": "user" }, { "content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: race condition in nvmap in nvidia tegra linux kernel 3.10 allows local users to gain privileges via a crafted nvmap_ioc_create ioctl call, which triggers a use-after-free error, as demonstrated by using a race condition to escape the chrome sandbox.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-02-06\nLast Modified Date: 2016-09-20", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in go_target.php in dev4u cms allows remote attackers to execute arbitrary sql commands via the kontent_id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-03-10 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in go_target.php in dev4u cms allows remote attackers to execute arbitrary sql commands via the kontent_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-10\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 4.9 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: buffer overflow in the save_into_file function in save.c for rogue 5.2-2 allows local users to execute arbitrary code with games group privileges by setting a long home environment variable and invoking the save game function with a ~ (tilde). Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): NONE/COMPLETE/NONE Published Date: 2003-12-31 Last Modified Date: 2017-07-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in the save_into_file function in save.c for rogue 5.2-2 allows local users to execute arbitrary code with games group privileges by setting a long home environment variable and invoking the save game function with a ~ (tilde).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/COMPLETE/NONE\nPublished Date: 2003-12-31\nLast Modified Date: 2017-07-29", "role": "assistant" } ]
CWE Code: 269 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Privilege Management Summary: the amazon web services (aws) cloudformation bootstrap tools package (aka aws-cfn-bootstrap) before 1.4-19.10 allows local users to execute arbitrary code with root privileges by leveraging the ability to create files in an unspecified directory. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-10-30 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Privilege Management.", "role": "user" }, { "content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Privilege Management\nSummary: the amazon web services (aws) cloudformation bootstrap tools package (aka aws-cfn-bootstrap) before 1.4-19.10 allows local users to execute arbitrary code with root privileges by leveraging the ability to create files in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-10-30\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 732 Vulnerability Type: privilege_escalation CVSS Score: 5.0 CWE Name: Incorrect Permission Assignment for Critical Resource Summary: an issue was discovered in switchgroup() in agent/exechelper/exechelpermain.cpp in phusion passenger before 5.3.2. the set of groups (gidset) is not set correctly, leaving it up to randomness (i.e., uninitialized memory) which supplementary groups are actually being set while lowering privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2018-06-21 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.", "role": "user" }, { "content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: an issue was discovered in switchgroup() in agent/exechelper/exechelpermain.cpp in phusion passenger before 5.3.2. the set of groups (gidset) is not set correctly, leaving it up to randomness (i.e., uninitialized memory) which supplementary groups are actually being set while lowering privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2018-06-21\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 2.6 CWE Name: Information Exposure Summary: an information disclosure vulnerability in the qualcomm video driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: kernel-3.18. android id: a-32510746. references: qc-cr#1088206. Access Authentication: NONE Access Complexity: HIGH Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2017-03-08 Last Modified Date: 2017-07-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.6\nCWE Name: Information Exposure\nSummary: an information disclosure vulnerability in the qualcomm video driver could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. product: android. versions: kernel-3.18. android id: a-32510746. references: qc-cr#1088206.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-03-08\nLast Modified Date: 2017-07-17", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: an issue was discovered in certain apple products. ios before 11.2 is affected. tvos before 11.2 is affected. watchos before 4.2 is affected. the issue involves the "iosurface" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-12-25 Last Modified Date: 2019-06-02
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 11.2 is affected. tvos before 11.2 is affected. watchos before 4.2 is affected. the issue involves the \"iosurface\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-12-25\nLast Modified Date: 2019-06-02", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Permissions Privileges and Access Controls Summary: an elevation of privilege vulnerability exists in the way that the rpcss.dll handles objects in memory, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1173, cve-2019-1174, cve-2019-1175, cve-2019-1178, cve-2019-1179, cve-2019-1180, cve-2019-1184, cve-2019-1186. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-08-14 Last Modified Date: 2019-08-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability exists in the way that the rpcss.dll handles objects in memory, aka 'windows elevation of privilege vulnerability'. this cve id is unique from cve-2019-1173, cve-2019-1174, cve-2019-1175, cve-2019-1178, cve-2019-1179, cve-2019-1180, cve-2019-1184, cve-2019-1186.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-14\nLast Modified Date: 2019-08-19", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in type.asp in jobpost 1.0 allows remote attackers to execute arbitrary sql commands via the itype parameter. note: some of these details are obtained from third party information. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-05-06 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in type.asp in jobpost 1.0 allows remote attackers to execute arbitrary sql commands via the itype parameter. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-05-06\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection exists in the raffle factory 3.5.2 component for joomla! via the filter_order_dir or filter_order parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-09-28 Last Modified Date: 2018-11-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in the raffle factory 3.5.2 component for joomla! via the filter_order_dir or filter_order parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-09-28\nLast Modified Date: 2018-11-15", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: an issue was discovered in certain apple products. ios before 11.2 is affected. macos before 10.13.2 is affected. tvos before 11.2 is affected. watchos before 4.2 is affected. the issue involves the "kernel" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-04-03 Last Modified Date: 2019-03-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 11.2 is affected. macos before 10.13.2 is affected. tvos before 11.2 is affected. watchos before 4.2 is affected. the issue involves the \"kernel\" component. it allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-04-03\nLast Modified Date: 2019-03-08", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the com_scheduling module for joomla! and mambo allows remote attackers to execute arbitrary sql commands via the id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-02-19 Last Modified Date: 2018-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the com_scheduling module for joomla! and mambo allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-19\nLast Modified Date: 2018-10-15", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in news.php in comicshout 2.8 allows remote attackers to execute arbitrary sql commands via the news_id parameter, a different vector than cve-2008-2456. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-03-06 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in news.php in comicshout 2.8 allows remote attackers to execute arbitrary sql commands via the news_id parameter, a different vector than cve-2008-2456.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-06\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in the administration interface in askia askiaweb allow remote attackers to execute arbitrary sql commands via (1) the nhistoryid parameter to webprod/pages/pghistory.asp or (2) the orderby parameter to webprod/pages/pgadmin.asp. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2013-03-21 Last Modified Date: 2013-03-22
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the administration interface in askia askiaweb allow remote attackers to execute arbitrary sql commands via (1) the nhistoryid parameter to webprod/pages/pghistory.asp or (2) the orderby parameter to webprod/pages/pgadmin.asp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-03-21\nLast Modified Date: 2013-03-22", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 9.3 CWE Name: Improper Input Validation Summary: dyld in apple ios before 9.2, tvos before 9.1, and watchos before 2.1 mishandles segment validation, which allows attackers to execute arbitrary code in a privileged context via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-12-11 Last Modified Date: 2019-03-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Improper Input Validation\nSummary: dyld in apple ios before 9.2, tvos before 9.1, and watchos before 2.1 mishandles segment validation, which allows attackers to execute arbitrary code in a privileged context via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-12-11\nLast Modified Date: 2019-03-08", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: cisco web security appliance (wsa) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle python module during certain tunnel-status checks, which allows local users to execute arbitrary python code and gain privileges via crafted serialized objects, aka bug id cscut39230. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2015-04-11 Last Modified Date: 2017-01-06
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: cisco web security appliance (wsa) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle python module during certain tunnel-status checks, which allows local users to execute arbitrary python code and gain privileges via crafted serialized objects, aka bug id cscut39230.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-04-11\nLast Modified Date: 2017-01-06", "role": "assistant" } ]
CWE Code: 200 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Information Exposure Summary: the openshift enterprise cluster-read can access webhook tokens which would allow an attacker with sufficient privileges to view confidential webhook tokens. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2018-08-13 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Information Exposure.", "role": "user" }, { "content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: the openshift enterprise cluster-read can access webhook tokens which would allow an attacker with sufficient privileges to view confidential webhook tokens.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-08-13\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in pages.php in internet dm specialist bed and breakfast allows remote attackers to execute arbitrary sql commands via the pp_id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-07-02 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in pages.php in internet dm specialist bed and breakfast allows remote attackers to execute arbitrary sql commands via the pp_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-07-02\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: cisco ios xr 6.1.1 allows local users to execute arbitrary os commands as root by leveraging admin privileges, aka bug id cscva38349. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-10-06 Last Modified Date: 2017-07-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: cisco ios xr 6.1.1 allows local users to execute arbitrary os commands as root by leveraging admin privileges, aka bug id cscva38349.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-10-06\nLast Modified Date: 2017-07-30", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: the nt virtual dos machine (ntvdm) subsystem in the kernel in microsoft windows xp sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2, windows 7 sp1, and windows 8 on 32-bit platforms does not properly validate kernel-memory addresses, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "windows kernel memory corruption vulnerability," a different vulnerability than cve-2013-3196 and cve-2013-3198. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2013-08-14 Last Modified Date: 2018-10-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the nt virtual dos machine (ntvdm) subsystem in the kernel in microsoft windows xp sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2, windows 7 sp1, and windows 8 on 32-bit platforms does not properly validate kernel-memory addresses, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka \"windows kernel memory corruption vulnerability,\" a different vulnerability than cve-2013-3196 and cve-2013-3198.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-08-14\nLast Modified Date: 2018-10-12", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the downloads module in koobi pro 5.7 allows remote attackers to execute arbitrary sql commands via the categ parameter to index.php. note: it was later reported that this also affects koobi cms 4.2.4, 4.2.5, and 4.3.0. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-03-03 Last Modified Date: 2018-10-11
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the downloads module in koobi pro 5.7 allows remote attackers to execute arbitrary sql commands via the categ parameter to index.php. note: it was later reported that this also affects koobi cms 4.2.4, 4.2.5, and 4.3.0.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-03-03\nLast Modified Date: 2018-10-11", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in chat/staff/default.aspx in readydesk 9.1 allows remote attackers to execute arbitrary sql commands via the user name field. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2016-08-26 Last Modified Date: 2016-12-06
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in chat/staff/default.aspx in readydesk 9.1 allows remote attackers to execute arbitrary sql commands via the user name field.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-08-26\nLast Modified Date: 2016-12-06", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: a vulnerability in the sponsor portal of cisco identity services engine (ise) could allow an authenticated, remote attacker to access notices owned by other users, because of sql injection. more information: cscvb15627. known affected releases: 1.4(0.908). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-02-22 Last Modified Date: 2017-07-25
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a vulnerability in the sponsor portal of cisco identity services engine (ise) could allow an authenticated, remote attacker to access notices owned by other users, because of sql injection. more information: cscvb15627. known affected releases: 1.4(0.908).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-02-22\nLast Modified Date: 2017-07-25", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Improper Access Control Summary: a vulnerability has been identified in siemens logo!8 (6ed1052-xyyxx-0ba8 fs:01 to fs:06 / firmware version v1.80.xx and v1.81.xx), siemens logo!8 (6ed1052-xyy08-0ba0 fs:01 / firmware version < v1.82.02). the integrated webserver does not invalidate the session id upon user logout. an attacker that successfully extracted a valid session id is able to use it even after the user logs out. the security vulnerability could be exploited by an attacker in a privileged network position who is able to read the communication between the affected device and the user or by an attacker who is able to obtain valid session ids through other means. the user must invoke a session to the affected device. at the time of advisory publication no public exploitation of this security vulnerability was known. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-06-12 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Access Control\nSummary: a vulnerability has been identified in siemens logo!8 (6ed1052-xyyxx-0ba8 fs:01 to fs:06 / firmware version v1.80.xx and v1.81.xx), siemens logo!8 (6ed1052-xyy08-0ba0 fs:01 / firmware version < v1.82.02). the integrated webserver does not invalidate the session id upon user logout. an attacker that successfully extracted a valid session id is able to use it even after the user logs out. the security vulnerability could be exploited by an attacker in a privileged network position who is able to read the communication between the affected device and the user or by an attacker who is able to obtain valid session ids through other means. the user must invoke a session to the affected device. at the time of advisory publication no public exploitation of this security vulnerability was known.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-06-12\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 125 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Out-of-bounds Read Summary: in libxaac, there is a possible out of bounds read due to a missing bounds check. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112611181 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-09-27 Last Modified Date: 2019-09-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Read.", "role": "user" }, { "content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Out-of-bounds Read\nSummary: in libxaac, there is a possible out of bounds read due to a missing bounds check. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-112611181\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30", "role": "assistant" } ]
CWE Code: 287 Vulnerability Type: privilege_escalation CVSS Score: 6.4 CWE Name: Improper Authentication Summary: an improper authentication vulnerability in ca privileged access manager 3.x web-ui jk-manager and jk-status allows a remote attacker to gain sensitive information or alter configuration. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/NONE Published Date: 2019-02-26 Last Modified Date: 2019-02-27
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Authentication.", "role": "user" }, { "content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 6.4\nCWE Name: Improper Authentication\nSummary: an improper authentication vulnerability in ca privileged access manager 3.x web-ui jk-manager and jk-status allows a remote attacker to gain sensitive information or alter configuration.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2019-02-26\nLast Modified Date: 2019-02-27", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in index.php in mole group hotel script 1.0 allows remote attackers to execute arbitrary sql commands via the file parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2008-07-10 Last Modified Date: 2017-09-29
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in mole group hotel script 1.0 allows remote attackers to execute arbitrary sql commands via the file parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-07-10\nLast Modified Date: 2017-09-29", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Improper Access Control Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: security: privileges). supported versions that are affected are 5.6.44 and prior and 5.7.18 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of mysql server accessible data. cvss 3.0 base score 2.7 (integrity impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:l/a:n). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2019-07-23 Last Modified Date: 2019-08-21
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Access Control\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: security: privileges). supported versions that are affected are 5.6.44 and prior and 5.7.18 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of mysql server accessible data. cvss 3.0 base score 2.7 (integrity impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:l/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-07-23\nLast Modified Date: 2019-08-21", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: an issue was discovered in certain apple products. ios before 11.4 is affected. the issue involves the "bluetooth" component. it allows attackers to gain privileges or cause a denial of service (buffer overflow) via a crafted app. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2018-06-08 Last Modified Date: 2018-07-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 11.4 is affected. the issue involves the \"bluetooth\" component. it allows attackers to gain privileges or cause a denial of service (buffer overflow) via a crafted app.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-06-08\nLast Modified Date: 2018-07-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: responsive realestate script 3.2 has sql injection via the property-list tbud parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2017-12-13 Last Modified Date: 2017-12-26
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: responsive realestate script 3.2 has sql injection via the property-list tbud parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-13\nLast Modified Date: 2017-12-26", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in default.asp in linkspro standard edition allows remote attackers to execute arbitrary sql commands via the orderdirection parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-02-05 Last Modified Date: 2009-02-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in default.asp in linkspro standard edition allows remote attackers to execute arbitrary sql commands via the orderdirection parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-05\nLast Modified Date: 2009-02-05", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: bluecms 1.6 allows sql injection via the user_id parameter in an uploads/admin/user.php?act=edit request. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-03-06 Last Modified Date: 2019-03-07
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: bluecms 1.6 allows sql injection via the user_id parameter in an uploads/admin/user.php?act=edit request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-03-06\nLast Modified Date: 2019-03-07", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 6.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in cisco unified communications manager (cucm) 7.1(x) through 9.1(2) allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscuh81766. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2013-07-18 Last Modified Date: 2013-08-20
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in cisco unified communications manager (cucm) 7.1(x) through 9.1(2) allows remote authenticated users to execute arbitrary sql commands via unspecified vectors, aka bug id cscuh81766.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-07-18\nLast Modified Date: 2013-08-20", "role": "assistant" } ]
CWE Code: 20 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Improper Input Validation Summary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.28 and prior to 6.0.6. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in takeover of oracle vm virtualbox. cvss 3.0 base score 8.8 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:h/i:h/a:h). Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-04-23 Last Modified Date: 2019-07-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Input Validation.", "role": "user" }, { "content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Input Validation\nSummary: vulnerability in the oracle vm virtualbox component of oracle virtualization (subcomponent: core). supported versions that are affected are prior to 5.2.28 and prior to 6.0.6. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where oracle vm virtualbox executes to compromise oracle vm virtualbox. while the vulnerability is in oracle vm virtualbox, attacks may significantly impact additional products. successful attacks of this vulnerability can result in takeover of oracle vm virtualbox. cvss 3.0 base score 8.8 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:c/c:h/i:h/a:h).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-04-23\nLast Modified Date: 2019-07-30", "role": "assistant" } ]
CWE Code: 787 Vulnerability Type: privilege_escalation CVSS Score: 4.4 CWE Name: Out-of-bounds Write Summary: in nfc, there is a possible out of bounds write due to a missing bounds check. this could lead to a to local escalation of privilege with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-120156401 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-09-27 Last Modified Date: 2019-10-02
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Write.", "role": "user" }, { "content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Out-of-bounds Write\nSummary: in nfc, there is a possible out of bounds write due to a missing bounds check. this could lead to a to local escalation of privilege with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-120156401\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-02", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 7.2 CWE Name: Permissions Privileges and Access Controls Summary: for the nvidia quadro, nvs, and geforce products, nvidia windows gpu display driver r340 before 342.00 and r375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for dxgddiescape id 0x70001b2 where the size of an input buffer is not validated, leading to denial of service or potential escalation of privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2016-11-08 Last Modified Date: 2019-03-07
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: for the nvidia quadro, nvs, and geforce products, nvidia windows gpu display driver r340 before 342.00 and r375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for dxgddiescape id 0x70001b2 where the size of an input buffer is not validated, leading to denial of service or potential escalation of privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-11-08\nLast Modified Date: 2019-03-07", "role": "assistant" } ]
CWE Code: 79 Vulnerability Type: privilege_escalation CVSS Score: 3.5 CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Summary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka "microsoft sharepoint elevation of privilege vulnerability." this affects microsoft sharepoint server, microsoft sharepoint. this cve id is unique from cve-2018-8428. Access Authentication: SINGLE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2018-09-13 Last Modified Date: 2019-10-03
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", "role": "user" }, { "content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: an elevation of privilege vulnerability exists when microsoft sharepoint server does not properly sanitize a specially crafted web request to an affected sharepoint server, aka \"microsoft sharepoint elevation of privilege vulnerability.\" this affects microsoft sharepoint server, microsoft sharepoint. this cve id is unique from cve-2018-8428.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2018-09-13\nLast Modified Date: 2019-10-03", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: multiple sql injection vulnerabilities in statusnet 1.0 before 1.0.2 and 1.1.0 allow remote attackers to execute arbitrary sql commands via vectors related to user lists and "a particular tag format." Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2013-10-11 Last Modified Date: 2013-10-15
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in statusnet 1.0 before 1.0.2 and 1.1.0 allow remote attackers to execute arbitrary sql commands via vectors related to user lists and \"a particular tag format.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-10-11\nLast Modified Date: 2013-10-15", "role": "assistant" } ]
CWE Code: 1187 Vulnerability Type: privilege_escalation CVSS Score: 4.3 CWE Name: Use of Uninitialized Resource Summary: in libavc there is a possible information disclosure due to uninitialized data. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-111762807 Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-09-27 Last Modified Date: 2019-09-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Use of Uninitialized Resource.", "role": "user" }, { "content": "CWE Code: 1187\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Use of Uninitialized Resource\nSummary: in libavc there is a possible information disclosure due to uninitialized data. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-111762807\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: an issue was discovered in css-tricks chat2 through 2015-05-05. the userid parameter in jumpin.php has a sql injection vulnerability. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-02-04 Last Modified Date: 2019-02-28
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in css-tricks chat2 through 2015-05-05. the userid parameter in jumpin.php has a sql injection vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-02-04\nLast Modified Date: 2019-02-28", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in list.php in php scripts now riddles allows remote attackers to execute arbitrary sql commands via the catid parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-08-20 Last Modified Date: 2017-08-17
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in list.php in php scripts now riddles allows remote attackers to execute arbitrary sql commands via the catid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-08-20\nLast Modified Date: 2017-08-17", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the ricoh interactive whiteboard d2200 v1.3 to v2.2, d5500 v1.3 to v2.2, d5510 v1.3 to v2.2, the display versions with ricoh interactive whiteboard controller type1 v1.3 to v2.2 attached (d5520, d6500, d6510, d7500, d8400), and the display versions with ricoh interactive whiteboard controller type2 v3.0 to v3.1.10137.0 attached (d5520, d6510, d7500, d8400) allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-01-09 Last Modified Date: 2019-02-08
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the ricoh interactive whiteboard d2200 v1.3 to v2.2, d5500 v1.3 to v2.2, d5510 v1.3 to v2.2, the display versions with ricoh interactive whiteboard controller type1 v1.3 to v2.2 attached (d5520, d6500, d6510, d7500, d8400), and the display versions with ricoh interactive whiteboard controller type2 v3.0 to v3.1.10137.0 attached (d5520, d6510, d7500, d8400) allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-01-09\nLast Modified Date: 2019-02-08", "role": "assistant" } ]
CWE Code: 434 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Unrestricted Upload of File with Dangerous Type Summary: basercms (basercms 4.1.0.1 and earlier versions, basercms 3.0.15 and earlier versions) allows remote attackers with a site operator privilege to upload arbitrary files. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/PARTIAL/NONE Published Date: 2018-06-26 Last Modified Date: 2018-08-21
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Unrestricted Upload of File with Dangerous Type.", "role": "user" }, { "content": "CWE Code: 434\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Unrestricted Upload of File with Dangerous Type\nSummary: basercms (basercms 4.1.0.1 and earlier versions, basercms 3.0.15 and earlier versions) allows remote attackers with a site operator privilege to upload arbitrary files.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2018-06-26\nLast Modified Date: 2018-08-21", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the yannick gaultier sh404sef component before 2.1.8.777 for joomla! allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2010-12-06 Last Modified Date: 2010-12-16
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the yannick gaultier sh404sef component before 2.1.8.777 for joomla! allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-12-06\nLast Modified Date: 2010-12-16", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 4.6 CWE Name: Permissions Privileges and Access Controls Summary: privilege escalation vulnerability in mcafee frp 5.x prior to 5.1.0.209 allows local users to gain elevated privileges via running mcafee tray with elevated privileges. Access Authentication: NONE Access Complexity: LOW Access Vector: LOCAL Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-08-14 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: privilege escalation vulnerability in mcafee frp 5.x prior to 5.1.0.209 allows local users to gain elevated privileges via running mcafee tray with elevated privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-14\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 125 Vulnerability Type: privilege_escalation CVSS Score: 5.0 CWE Name: Out-of-bounds Read Summary: in bta_hh_ctrl_dat_act of bta_hh_act.cc in android-7.0, android-7.1.1, android-7.1.2, android-8.0, android-8.1 and android-9, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. android id: a-116108738. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/NONE/NONE Published Date: 2019-02-11 Last Modified Date: 2019-02-12
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Out-of-bounds Read.", "role": "user" }, { "content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Out-of-bounds Read\nSummary: in bta_hh_ctrl_dat_act of bta_hh_act.cc in android-7.0, android-7.1.1, android-7.1.2, android-8.0, android-8.1 and android-9, there is a possible out of bounds read due to a missing bounds check. this could lead to remote information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. android id: a-116108738.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-02-11\nLast Modified Date: 2019-02-12", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the gateway provisioning service in emc secure remote services virtual edition (esrs ve) 3.02 and 3.03 allows remote attackers to execute arbitrary sql commands via unspecified vectors. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2015-03-12 Last Modified Date: 2018-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the gateway provisioning service in emc secure remote services virtual edition (esrs ve) 3.02 and 3.03 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-03-12\nLast Modified Date: 2018-10-09", "role": "assistant" } ]
CWE Code: 284 Vulnerability Type: privilege_escalation CVSS Score: 4.0 CWE Name: Improper Access Control Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h). Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): NONE/NONE/PARTIAL Published Date: 2019-04-23 Last Modified Date: 2019-08-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Access Control.", "role": "user" }, { "content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Access Control\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-04-23\nLast Modified Date: 2019-08-14", "role": "assistant" } ]
CWE Code: 78 Vulnerability Type: privilege_escalation CVSS Score: 9.0 CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Summary: in version 3.5 and prior of cambium networks epmp firmware, a lack of input sanitation for certain parameters on the web management console allows any authenticated user (including the otherwise low-privilege readonly user) to inject shell meta-characters as part of a specially-crafted post request to the get_chart function and run os-level commands, effectively as root. Access Authentication: SINGLE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2017-12-20 Last Modified Date: 2019-10-09
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').", "role": "user" }, { "content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: in version 3.5 and prior of cambium networks epmp firmware, a lack of input sanitation for certain parameters on the web management console allows any authenticated user (including the otherwise low-privilege readonly user) to inject shell meta-characters as part of a specially-crafted post request to the get_chart function and run os-level commands, effectively as root.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-12-20\nLast Modified Date: 2019-10-09", "role": "assistant" } ]
CWE Code: 119 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer Summary: multiple buffer overflows in php before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions. note: vector 6 might actually be an integer overflow (cve-2007-1885). note: as of 20070411, vector (3) might involve the imap_mail_compose function (cve-2007-1825). Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2007-02-13 Last Modified Date: 2018-10-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.", "role": "user" }, { "content": "CWE Code: 119\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: multiple buffer overflows in php before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions. note: vector 6 might actually be an integer overflow (cve-2007-1885). note: as of 20070411, vector (3) might involve the imap_mail_compose function (cve-2007-1825).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-02-13\nLast Modified Date: 2018-10-30", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in modules/news/rss.php in lepton before 1.1.4 allows remote attackers to execute arbitrary sql commands via the group_id parameter. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2012-02-24 Last Modified Date: 2012-02-24
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in modules/news/rss.php in lepton before 1.1.4 allows remote attackers to execute arbitrary sql commands via the group_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-02-24\nLast Modified Date: 2012-02-24", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in the webamoeba (wa) ticket system (com_waticketsystem) component for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter in a category action to index.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2009-01-29 Last Modified Date: 2017-10-19
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the webamoeba (wa) ticket system (com_waticketsystem) component for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter in a category action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-01-29\nLast Modified Date: 2017-10-19", "role": "assistant" } ]
CWE Code: 415 Vulnerability Type: privilege_escalation CVSS Score: 10.0 CWE Name: Double Free Summary: in bnep_data_ind of bnep_main.c, there is a possible remote code execution due to a double free. this could lead to remote code execution with no additional execution privileges needed. user interaction is not needed for exploitation. product: android versions: android-6.0 android-6.0.1 android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android id: a-74950468. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE Published Date: 2018-11-06 Last Modified Date: 2018-12-14
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Double Free.", "role": "user" }, { "content": "CWE Code: 415\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Double Free\nSummary: in bnep_data_ind of bnep_main.c, there is a possible remote code execution due to a double free. this could lead to remote code execution with no additional execution privileges needed. user interaction is not needed for exploitation. product: android versions: android-6.0 android-6.0.1 android-7.0 android-7.1.1 android-7.1.2 android-8.0 android-8.1 android id: a-74950468.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-11-06\nLast Modified Date: 2018-12-14", "role": "assistant" } ]
CWE Code: 89 Vulnerability Type: sql_injection CVSS Score: 7.5 CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Summary: sql injection vulnerability in leaguemanager.php in the leaguemanager plugin before 3.8.1 for wordpress allows remote attackers to execute arbitrary sql commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php. Access Authentication: NONE Access Complexity: LOW Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2014-02-05 Last Modified Date: 2014-02-05
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').", "role": "user" }, { "content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in leaguemanager.php in the leaguemanager plugin before 3.8.1 for wordpress allows remote attackers to execute arbitrary sql commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-02-05\nLast Modified Date: 2014-02-05", "role": "assistant" } ]
CWE Code: 264 Vulnerability Type: privilege_escalation CVSS Score: 6.8 CWE Name: Permissions Privileges and Access Controls Summary: it was found that in ghostscript some privileged operators remained accessible from various places after the cve-2019-6116 fix. a specially crafted postscript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dsafer. ghostscript versions before 9.27 are vulnerable. Access Authentication: NONE Access Complexity: MEDIUM Access Vector: NETWORK Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL Published Date: 2019-05-16 Last Modified Date: 2019-05-30
[ { "content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.", "role": "system" }, { "content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.", "role": "user" }, { "content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: it was found that in ghostscript some privileged operators remained accessible from various places after the cve-2019-6116 fix. a specially crafted postscript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dsafer. ghostscript versions before 9.27 are vulnerable.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-05-16\nLast Modified Date: 2019-05-30", "role": "assistant" } ]