text
stringlengths 365
3.97k
| conversations
listlengths 3
3
|
---|---|
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in kommentar.php in pgb 2.12 allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2013-01-31
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in kommentar.php in pgb 2.12 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-01-31\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 502
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Deserialization of Untrusted Data
Summary: in jobstore, there is a mismatched serialization/deserialization for the "battery-not-low" job attribute. this could lead to a local denial of service with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-130173029
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-09-27
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Deserialization of Untrusted Data.",
"role": "user"
},
{
"content": "CWE Code: 502\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Deserialization of Untrusted Data\nSummary: in jobstore, there is a mismatched serialization/deserialization for the \"battery-not-low\" job attribute. this could lead to a local denial of service with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-130173029\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in survey_results_text.php in turnkeyforms business survey pro 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-03-02
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in survey_results_text.php in turnkeyforms business survey pro 1.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-02\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the tpjobs (com_tpjobs) component for joomla! allows remote attackers to execute arbitrary sql commands via the id_c[] parameter in a resadvsearch action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-03-16
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the tpjobs (com_tpjobs) component for joomla! allows remote attackers to execute arbitrary sql commands via the id_c[] parameter in a resadvsearch action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-16\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.0
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the quartz plugin 1.01.1 for wordpress allows remote authenticated users with contributor privileges to execute arbitrary sql commands via the quote parameter in an edit action in the quartz/quote_form.php page to wp-admin/edit.php.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-08-06
Last Modified Date: 2014-08-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the quartz plugin 1.01.1 for wordpress allows remote authenticated users with contributor privileges to execute arbitrary sql commands via the quote parameter in an edit action in the quartz/quote_form.php page to wp-admin/edit.php.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-08-06\nLast Modified Date: 2014-08-07",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: in avrc_pars_browsing_cmd of avrc_pars_tg.cc, there is a possible stack buffer overflow due to an incorrect bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 8.0, 8.1. android id: a-71603262.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-04-04
Last Modified Date: 2018-05-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: in avrc_pars_browsing_cmd of avrc_pars_tg.cc, there is a possible stack buffer overflow due to an incorrect bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is not needed for exploitation. product: android. versions: 8.0, 8.1. android id: a-71603262.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-04-04\nLast Modified Date: 2018-05-09",
"role": "assistant"
}
] |
CWE Code: 399
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Resource Management Errors
Summary: unquoted windows search path vulnerability in the red hat enterprise virtualization application provisioning tool (rhev-apt) in the rhev-guest-tools-iso package 3.2 allows local users to gain privileges via a trojan horse application.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-08-28
Last Modified Date: 2013-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Resource Management Errors.",
"role": "user"
},
{
"content": "CWE Code: 399\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Resource Management Errors\nSummary: unquoted windows search path vulnerability in the red hat enterprise virtualization application provisioning tool (rhev-apt) in the rhev-guest-tools-iso package 3.2 allows local users to gain privileges via a trojan horse application.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-08-28\nLast Modified Date: 2013-08-29",
"role": "assistant"
}
] |
CWE Code: 426
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Untrusted Search Path
Summary: untrusted search path vulnerability in the installer in vmware workstation pro 12.x before 12.5.0 and vmware workstation player 12.x before 12.5.0 on windows allows local users to gain privileges via a trojan horse dll in an unspecified directory.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-12-29
Last Modified Date: 2017-07-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Untrusted Search Path.",
"role": "user"
},
{
"content": "CWE Code: 426\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Untrusted Search Path\nSummary: untrusted search path vulnerability in the installer in vmware workstation pro 12.x before 12.5.0 and vmware workstation player 12.x before 12.5.0 on windows allows local users to gain privileges via a trojan horse dll in an unspecified directory.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-12-29\nLast Modified Date: 2017-07-30",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: the virtual machine communication interface (vmci) implementation in vmci.sys in vmware workstation 8.x before 8.0.5 and 9.x before 9.0.1 on windows, vmware fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, vmware view 4.x before 4.6.2 and 5.x before 5.1.2 on windows, vmware esxi 4.0 through 5.1, and vmware esx 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-02-11
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: the virtual machine communication interface (vmci) implementation in vmci.sys in vmware workstation 8.x before 8.0.5 and 9.x before 9.0.1 on windows, vmware fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, vmware view 4.x before 4.6.2 and 5.x before 5.1.2 on windows, vmware esxi 4.0 through 5.1, and vmware esx 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-02-11\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.6
CWE Name: Permissions Privileges and Access Controls
Summary: an elevation of privilege vulnerability in the qualcomm secure execution environment communicator driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31804432. references: qc-cr#1086186.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-02-08
Last Modified Date: 2017-07-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability in the qualcomm secure execution environment communicator driver could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as high because it first requires compromising a privileged process. product: android. versions: kernel-3.10, kernel-3.18. android id: a-31804432. references: qc-cr#1086186.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-02-08\nLast Modified Date: 2017-07-25",
"role": "assistant"
}
] |
CWE Code: 352
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Cross-Site Request Forgery (CSRF)
Summary: a vulnerability in the web-based management interface of cisco firepower management center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (csrf) attack and perform arbitrary actions on an affected device. the vulnerability is due to insufficient csrf protections for the web-based management interface of the affected device. an attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. a successful exploit could allow the attacker to perform arbitrary actions on the targeted device via a web browser and with the privileges of the user. cisco bug ids: cscvb19750.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-06-21
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF).",
"role": "user"
},
{
"content": "CWE Code: 352\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Cross-Site Request Forgery (CSRF)\nSummary: a vulnerability in the web-based management interface of cisco firepower management center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (csrf) attack and perform arbitrary actions on an affected device. the vulnerability is due to insufficient csrf protections for the web-based management interface of the affected device. an attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. a successful exploit could allow the attacker to perform arbitrary actions on the targeted device via a web browser and with the privileges of the user. cisco bug ids: cscvb19750.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-06-21\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: ibm atlas ediscovery process management 6.0.3 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 126683.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-07
Last Modified Date: 2017-12-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: ibm atlas ediscovery process management 6.0.3 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 126683.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-07\nLast Modified Date: 2017-12-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in pollbooth.php in oscommerce poll booth add-on 2.0 allows remote attackers to execute arbitrary sql commands via the pollid parameter in a results operation. note: this issue was disclosed by an unreliable researcher, so it might be incorrect.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-28
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in pollbooth.php in oscommerce poll booth add-on 2.0 allows remote attackers to execute arbitrary sql commands via the pollid parameter in a results operation. note: this issue was disclosed by an unreliable researcher, so it might be incorrect.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-28\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Privilege Management
Summary: advantech webaccess 8.3.1 and earlier has an improper privilege management vulnerability, which may allow an attacker to access those files and perform actions at a system administrator level.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-10-23
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Privilege Management\nSummary: advantech webaccess 8.3.1 and earlier has an improper privilege management vulnerability, which may allow an attacker to access those files and perform actions at a system administrator level.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-10-23\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: the qualcomm gpu driver in android before 2016-07-05 on nexus 5x and 6p devices allows attackers to gain privileges via a crafted application, aka android internal bug 28084795 and qualcomm internal bug cr1006067.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-07-11
Last Modified Date: 2016-07-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: the qualcomm gpu driver in android before 2016-07-05 on nexus 5x and 6p devices allows attackers to gain privileges via a crafted application, aka android internal bug 28084795 and qualcomm internal bug cr1006067.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-11\nLast Modified Date: 2016-07-11",
"role": "assistant"
}
] |
CWE Code: 255
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Credentials Management
Summary: the windows installer for apache tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-11-12
Last Modified Date: 2019-03-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Credentials Management.",
"role": "user"
},
{
"content": "CWE Code: 255\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Credentials Management\nSummary: the windows installer for apache tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-11-12\nLast Modified Date: 2019-03-25",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: the chrome object wrapper (cow) implementation in mozilla firefox before 21.0, firefox esr 17.x before 17.0.6, thunderbird before 17.0.6, and thunderbird esr 17.x before 17.0.6 does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (xss) attacks via a crafted web site.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2013-05-16
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: the chrome object wrapper (cow) implementation in mozilla firefox before 21.0, firefox esr 17.x before 17.0.6, thunderbird before 17.0.6, and thunderbird esr 17.x before 17.0.6 does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (xss) attacks via a crafted web site.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2013-05-16\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the update_events function in events_functions.asp in maxwebportal 1.33 and earlier allows remote attackers to execute arbitrary sql commands via the event_id parameter, as demonstrated using events.asp.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2005-05-02
Last Modified Date: 2017-07-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the update_events function in events_functions.asp in maxwebportal 1.33 and earlier allows remote attackers to execute arbitrary sql commands via the event_id parameter, as demonstrated using events.asp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2005-05-02\nLast Modified Date: 2017-07-11",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: libs/binder/ipcthreadstate.cpp in binder in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 mishandles object references, which allows attackers to gain privileges via a crafted application, aka internal bug 27252896.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-05-09
Last Modified Date: 2016-05-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: libs/binder/ipcthreadstate.cpp in binder in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 mishandles object references, which allows attackers to gain privileges via a crafted application, aka internal bug 27252896.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-05-09\nLast Modified Date: 2016-05-10",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 4.9
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: stack consumption vulnerability in the do_page_fault function in arch/x86/mm/fault.c in the linux kernel before 2.6.28.5 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via unspecified vectors that trigger page faults on a machine that has a registered kprobes probe.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2009-02-17
Last Modified Date: 2012-03-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 4.9\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: stack consumption vulnerability in the do_page_fault function in arch/x86/mm/fault.c in the linux kernel before 2.6.28.5 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via unspecified vectors that trigger page faults on a machine that has a registered kprobes probe.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2009-02-17\nLast Modified Date: 2012-03-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in atcom netvolution 3 allows remote attackers to execute arbitrary sql commands via the m parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-03-11
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in atcom netvolution 3 allows remote attackers to execute arbitrary sql commands via the m parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-03-11\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 189
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Numeric Errors
Summary: multiple integer overflows in the (1) fontfileaddentry and (2) lexalias functions in x.org libxfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-05-15
Last Modified Date: 2018-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Numeric Errors.",
"role": "user"
},
{
"content": "CWE Code: 189\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Numeric Errors\nSummary: multiple integer overflows in the (1) fontfileaddentry and (2) lexalias functions in x.org libxfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-05-15\nLast Modified Date: 2018-10-09",
"role": "assistant"
}
] |
CWE Code: 94
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Control of Generation of Code ('Code Injection')
Summary: eval injection vulnerability in the ldapagnt_eval function in ldapagnt.dll in unifid.exe in netiq privileged user manager 2.3.x before 2.3.1 hf2 allows remote attackers to execute arbitrary perl code via a crafted application/x-amf request.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2012-12-24
Last Modified Date: 2013-01-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Control of Generation of Code ('Code Injection').",
"role": "user"
},
{
"content": "CWE Code: 94\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Control of Generation of Code ('Code Injection')\nSummary: eval injection vulnerability in the ldapagnt_eval function in ldapagnt.dll in unifid.exe in netiq privileged user manager 2.3.x before 2.3.1 hf2 allows remote attackers to execute arbitrary perl code via a crafted application/x-amf request.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-12-24\nLast Modified Date: 2013-01-08",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 6.0
CWE Name: Improper Access Control
Summary: vulnerability in the bi publisher (formerly xml publisher) component of oracle fusion middleware (subcomponent: bi publisher security). supported versions that are affected are 11.1.1.9.0 and 12.2.1.3.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise bi publisher (formerly xml publisher). successful attacks require human interaction from a person other than the attacker and while the vulnerability is in bi publisher (formerly xml publisher), attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all bi publisher (formerly xml publisher) accessible data as well as unauthorized read access to a subset of bi publisher (formerly xml publisher) accessible data and unauthorized ability to cause a partial denial of service (partial dos) of bi publisher (formerly xml publisher). cvss 3.0 base score 8.2 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:r/s:c/c:l/i:h/a:l).
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-07-23
Last Modified Date: 2019-07-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 6.0\nCWE Name: Improper Access Control\nSummary: vulnerability in the bi publisher (formerly xml publisher) component of oracle fusion middleware (subcomponent: bi publisher security). supported versions that are affected are 11.1.1.9.0 and 12.2.1.3.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise bi publisher (formerly xml publisher). successful attacks require human interaction from a person other than the attacker and while the vulnerability is in bi publisher (formerly xml publisher), attacks may significantly impact additional products. successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all bi publisher (formerly xml publisher) accessible data as well as unauthorized read access to a subset of bi publisher (formerly xml publisher) accessible data and unauthorized ability to cause a partial denial of service (partial dos) of bi publisher (formerly xml publisher). cvss 3.0 base score 8.2 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:r/s:c/c:l/i:h/a:l).\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-23\nLast Modified Date: 2019-07-25",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Access Control
Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-01-16
Last Modified Date: 2019-08-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Access Control\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-01-16\nLast Modified Date: 2019-08-14",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Permissions Privileges and Access Controls
Summary: click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for ubuntu phone.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-02-13
Last Modified Date: 2017-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for ubuntu phone.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-02-13\nLast Modified Date: 2017-10-03",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: cross-site scripting (xss) vulnerability in the sections module 5.x before 5.x-1.3 and 6.x before 6.x-1.3 for drupal allows remote authenticated users with "administer sections" privileges to inject arbitrary web script or html via a section name (aka the name field).
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2009-12-28
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: cross-site scripting (xss) vulnerability in the sections module 5.x before 5.x-1.3 and 6.x before 6.x-1.3 for drupal allows remote authenticated users with \"administer sections\" privileges to inject arbitrary web script or html via a section name (aka the name field).\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2009-12-28\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Improper Access Control
Summary: vulnerability in the peoplesoft enterprise peopletools component of oracle peoplesoft products (subcomponent: xml publisher). supported versions that are affected are 8.55, 8.56 and 8.57. easily exploitable vulnerability allows high privileged attacker with network access via http to compromise peoplesoft enterprise peopletools. successful attacks of this vulnerability can result in takeover of peoplesoft enterprise peopletools. cvss 3.0 base score 7.2 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:h/i:h/a:h).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-01-16
Last Modified Date: 2019-01-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Improper Access Control\nSummary: vulnerability in the peoplesoft enterprise peopletools component of oracle peoplesoft products (subcomponent: xml publisher). supported versions that are affected are 8.55, 8.56 and 8.57. easily exploitable vulnerability allows high privileged attacker with network access via http to compromise peoplesoft enterprise peopletools. successful attacks of this vulnerability can result in takeover of peoplesoft enterprise peopletools. cvss 3.0 base score 7.2 (confidentiality, integrity and availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:h/i:h/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-01-16\nLast Modified Date: 2019-01-18",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 3.3
CWE Name: Improper Access Control
Summary: a vulnerability in the fabric infrastructure vlan connection establishment of the cisco nexus 9000 series application centric infrastructure (aci) mode switch software could allow an unauthenticated, adjacent attacker to bypass security validations and connect an unauthorized server to the infrastructure vlan. the vulnerability is due to insufficient security requirements during the link layer discovery protocol (lldp) setup phase of the infrastructure vlan. an attacker could exploit this vulnerability by sending a malicious lldp packet on the adjacent subnet to the cisco nexus 9000 series switch in aci mode. a successful exploit could allow the attacker to connect an unauthorized server to the infrastructure vlan, which is highly privileged. with a connection to the infrastructure vlan, the attacker can make unauthorized connections to cisco application policy infrastructure controller (apic) services or join other host endpoints.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2019-07-04
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 3.3\nCWE Name: Improper Access Control\nSummary: a vulnerability in the fabric infrastructure vlan connection establishment of the cisco nexus 9000 series application centric infrastructure (aci) mode switch software could allow an unauthenticated, adjacent attacker to bypass security validations and connect an unauthorized server to the infrastructure vlan. the vulnerability is due to insufficient security requirements during the link layer discovery protocol (lldp) setup phase of the infrastructure vlan. an attacker could exploit this vulnerability by sending a malicious lldp packet on the adjacent subnet to the cisco nexus 9000 series switch in aci mode. a successful exploit could allow the attacker to connect an unauthorized server to the infrastructure vlan, which is highly privileged. with a connection to the infrastructure vlan, the attacker can make unauthorized connections to cisco application policy infrastructure controller (apic) services or join other host endpoints.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-07-04\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 1.5
CWE Name: Information Exposure
Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: replication). supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where mysql server executes to compromise mysql server. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all mysql server accessible data. cvss 3.0 base score 4.1 (confidentiality impacts). cvss vector: (cvss:3.0/av:l/ac:h/pr:h/ui:n/s:u/c:h/i:n/a:n).
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2017-10-19
Last Modified Date: 2019-05-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 1.5\nCWE Name: Information Exposure\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: replication). supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where mysql server executes to compromise mysql server. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all mysql server accessible data. cvss 3.0 base score 4.1 (confidentiality impacts). cvss vector: (cvss:3.0/av:l/ac:h/pr:h/ui:n/s:u/c:h/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-10-19\nLast Modified Date: 2019-05-21",
"role": "assistant"
}
] |
CWE Code: 74
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Summary: the ibmc (intelligent baseboard management controller) of some huawei servers have a json injection vulnerability due to insufficient input validation. an authenticated, remote attacker can launch a json injection to modify the password of administrator. successful exploit may allow attackers to obtain the management privilege of the system.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-06-01
Last Modified Date: 2018-07-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection').",
"role": "user"
},
{
"content": "CWE Code: 74\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')\nSummary: the ibmc (intelligent baseboard management controller) of some huawei servers have a json injection vulnerability due to insufficient input validation. an authenticated, remote attacker can launch a json injection to modify the password of administrator. successful exploit may allow attackers to obtain the management privilege of the system.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-06-01\nLast Modified Date: 2018-07-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the alberghi (com_alberghi) 2.1.3 and earlier component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-03-24
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the alberghi (com_alberghi) 2.1.3 and earlier component for mambo and joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a detail action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-03-24\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an issue was discovered in certain apple products. ios before 10.3.2 is affected. macos before 10.12.5 is affected. the issue involves the "sqlite" component. it allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-04-03
Last Modified Date: 2018-04-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 10.3.2 is affected. macos before 10.12.5 is affected. the issue involves the \"sqlite\" component. it allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-04-03\nLast Modified Date: 2018-04-27",
"role": "assistant"
}
] |
CWE Code: 732
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Incorrect Permission Assignment for Critical Resource
Summary: a vulnerability where a webextension can run content scripts in disallowed contexts following navigation or other events. this allows for potential privilege escalation by the webextension on sites where content scripts should not be run. this vulnerability affects firefox esr < 60.3 and firefox < 63.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2019-02-28
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.",
"role": "user"
},
{
"content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: a vulnerability where a webextension can run content scripts in disallowed contexts following navigation or other events. this allows for potential privilege escalation by the webextension on sites where content scripts should not be run. this vulnerability affects firefox esr < 60.3 and firefox < 63.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-02-28\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in hispah text links ads 1.1 allows remote attackers to execute arbitrary sql commands via the idcat parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-16
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in hispah text links ads 1.1 allows remote attackers to execute arbitrary sql commands via the idcat parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-16\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in mybulletinboard (mybb) before 1.0 allow remote attackers to execute arbitrary sql commands via the (1) month, (2) day, and (3) year parameters in an addevent action in calendar.php; (4) threadmode and (5) showcodebuttons in an options action in usercp.php; (6) list parameter in an editlists action to usercp.php; (7) rating parameter in a rate action in member.php; and (8) rating parameter in either showthread.php or ratethread.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2005-12-13
Last Modified Date: 2018-10-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in mybulletinboard (mybb) before 1.0 allow remote attackers to execute arbitrary sql commands via the (1) month, (2) day, and (3) year parameters in an addevent action in calendar.php; (4) threadmode and (5) showcodebuttons in an options action in usercp.php; (6) list parameter in an editlists action to usercp.php; (7) rating parameter in a rate action in member.php; and (8) rating parameter in either showthread.php or ratethread.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2005-12-13\nLast Modified Date: 2018-10-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the vulnerability exists within processing of editobject.php in schneider electric u.motion builder software versions prior to v1.3.4. the underlying sqlite database query is subject to sql injection on the type input parameter.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-07-03
Last Modified Date: 2018-08-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the vulnerability exists within processing of editobject.php in schneider electric u.motion builder software versions prior to v1.3.4. the underlying sqlite database query is subject to sql injection on the type input parameter.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-07-03\nLast Modified Date: 2018-08-21",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection in trend micro control manager 6.0 causes remote code execution when restfulserviceutility.net.dll doesn't properly validate user provided strings before constructing sql queries. formerly zdi-can-4639 and zdi-can-4638.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-08-02
Last Modified Date: 2017-08-06 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection in trend micro control manager 6.0 causes remote code execution when restfulserviceutility.net.dll doesn't properly validate user provided strings before constructing sql queries. formerly zdi-can-4639 and zdi-can-4638.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-08-02\nLast Modified Date: 2017-08-06",
"role": "assistant"
}
] |
CWE Code: 352
Vulnerability Type: sql_injection
CVSS Score: 4.3
CWE Name: Cross-Site Request Forgery (CSRF)
Summary: the unite-gallery-lite plugin before 1.5 for wordpress has csrf and sql injection via wp-admin/admin.php galleryid or id parameters.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2019-09-26
Last Modified Date: 2019-09-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF).",
"role": "user"
},
{
"content": "CWE Code: 352\nVulnerability Type: sql_injection\nCVSS Score: 4.3\nCWE Name: Cross-Site Request Forgery (CSRF)\nSummary: the unite-gallery-lite plugin before 1.5 for wordpress has csrf and sql injection via wp-admin/admin.php galleryid or id parameters.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-09-26\nLast Modified Date: 2019-09-27",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in webcal3_detail.asp in webcal 3.04 allows remote attackers to execute arbitrary sql commands via the event_id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-06-05
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in webcal3_detail.asp in webcal 3.04 allows remote attackers to execute arbitrary sql commands via the event_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-06-05\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the huru helpdesk (com_huruhelpdesk) component for joomla! allows remote attackers to execute arbitrary sql commands via the cid[0] parameter in a detail action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-07-28
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the huru helpdesk (com_huruhelpdesk) component for joomla! allows remote attackers to execute arbitrary sql commands via the cid[0] parameter in a detail action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-07-28\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 255
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Credentials Management
Summary: evalsmsi 2.1.03 stores passwords in cleartext in the database, which allows attackers with database access to gain privileges. note: remote attack vectors are possible by leveraging a separate sql injection vulnerability.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-02-11
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Credentials Management.",
"role": "user"
},
{
"content": "CWE Code: 255\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Credentials Management\nSummary: evalsmsi 2.1.03 stores passwords in cleartext in the database, which allows attackers with database access to gain privileges. note: remote attack vectors are possible by leveraging a separate sql injection vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-02-11\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in includes/classes/authenticate.class.php in php-fusion 7.02.01 through 7.02.05 allows remote attackers to execute arbitrary sql commands via the user id in a user cookie, a different vulnerability than cve-2013-1803.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-05-05
Last Modified Date: 2016-12-31 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in includes/classes/authenticate.class.php in php-fusion 7.02.01 through 7.02.05 allows remote attackers to execute arbitrary sql commands via the user id in a user cookie, a different vulnerability than cve-2013-1803.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-05-05\nLast Modified Date: 2016-12-31",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an issue was discovered in certain apple products. ios before 10.3.2 is affected. macos before 10.12.5 is affected. the issue involves the "sqlite" component. it allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-04-03
Last Modified Date: 2018-04-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in certain apple products. ios before 10.3.2 is affected. macos before 10.12.5 is affected. the issue involves the \"sqlite\" component. it allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-04-03\nLast Modified Date: 2018-04-27",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection exists in facebook style php ajax chat zechat 1.5 via the login.php user field.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-01-24
Last Modified Date: 2018-02-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in facebook style php ajax chat zechat 1.5 via the login.php user field.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-01-24\nLast Modified Date: 2018-02-07",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: multiple cross-site scripting (xss) vulnerabilities in mailbird before 2.7.5.0 r allow remote attackers to execute arbitrary javascript in a privileged context via a crafted html mail message. this vulnerability is distinct from cve-2015-4657.
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-18
Last Modified Date: 2019-11-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: multiple cross-site scripting (xss) vulnerabilities in mailbird before 2.7.5.0 r allow remote attackers to execute arbitrary javascript in a privileged context via a crafted html mail message. this vulnerability is distinct from cve-2015-4657.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-18\nLast Modified Date: 2019-11-18",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 4.0
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: doorgets 7.0 has a sql injection vulnerability in /doorgets/app/requests/user/configurationrequest.php when action=analytics. a remote background administrator privilege user (or a user with permission to manage configuration analytics) could exploit the vulnerability to obtain database sensitive information.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-04-30
Last Modified Date: 2019-05-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 4.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: doorgets 7.0 has a sql injection vulnerability in /doorgets/app/requests/user/configurationrequest.php when action=analytics. a remote background administrator privilege user (or a user with permission to manage configuration analytics) could exploit the vulnerability to obtain database sensitive information.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-04-30\nLast Modified Date: 2019-05-01",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in filebase.php in the filebase mod for phpbb allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-03-12
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in filebase.php in the filebase mod for phpbb allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-03-12\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Permissions Privileges and Access Controls
Summary: the mozilla updater in mozilla firefox before 21.0 on windows does not properly maintain mozilla maintenance service registry entries in certain situations involving upgrades from older firefox versions, which allows local users to gain privileges by leveraging write access to a "trusted path."
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-05-16
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: the mozilla updater in mozilla firefox before 21.0 on windows does not properly maintain mozilla maintenance service registry entries in certain situations involving upgrades from older firefox versions, which allows local users to gain privileges by leveraging write access to a \"trusted path.\"\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-05-16\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Out-of-bounds Read
Summary: in the android kernel in f2fs driver there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure with system execution privileges needed. user interaction is not needed for exploitation.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-06
Last Modified Date: 2019-09-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Out-of-bounds Read\nSummary: in the android kernel in f2fs driver there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure with system execution privileges needed. user interaction is not needed for exploitation.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-06\nLast Modified Date: 2019-09-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in ip reg 0.4 and earlier allow remote attackers to execute arbitrary sql commands via the (1) location_id parameter to locationdel.php and (2) vlan_id parameter to vlanedit.php. note: the vlanview.php and vlandel.php vectors are already covered by cve-2007-6579.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-18
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in ip reg 0.4 and earlier allow remote attackers to execute arbitrary sql commands via the (1) location_id parameter to locationdel.php and (2) vlan_id parameter to vlanedit.php. note: the vlanview.php and vlandel.php vectors are already covered by cve-2007-6579.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-18\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Permissions Privileges and Access Controls
Summary: microsoft internet explorer 10 and 11 and microsoft edge do not properly restrict access to private namespaces, which allows remote attackers to gain privileges via unspecified vectors, aka "microsoft browser elevation of privilege vulnerability," a different vulnerability than cve-2016-3388.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-10-14
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: microsoft internet explorer 10 and 11 and microsoft edge do not properly restrict access to private namespaces, which allows remote attackers to gain privileges via unspecified vectors, aka \"microsoft browser elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3388.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-10-14\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the statistics (ke_stats) extension before 1.1.2 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors, as exploited in the wild in february 2014.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-10-03
Last Modified Date: 2014-10-06 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the statistics (ke_stats) extension before 1.1.2 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors, as exploited in the wild in february 2014.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-10-03\nLast Modified Date: 2014-10-06",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in pics_pre.asp in gallery mx 2.0.0 allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-03-02
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in pics_pre.asp in gallery mx 2.0.0 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-02\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: an issue was discovered in photodex proshow producer v9.0.3797 (an application that runs with administrator privileges). it is possible to perform a buffer overflow via a crafted file.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-06-10
Last Modified Date: 2019-06-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: an issue was discovered in photodex proshow producer v9.0.3797 (an application that runs with administrator privileges). it is possible to perform a buffer overflow via a crafted file.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-06-10\nLast Modified Date: 2019-06-12",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Permissions Privileges and Access Controls
Summary: the tracing feature for services in microsoft windows vista sp1 and sp2, windows server 2008 gold, sp2, and r2, and windows 7 has incorrect acls on its registry keys, which allows local users to gain privileges via vectors involving a named pipe and impersonation, aka "tracing registry key acl vulnerability."
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-08-11
Last Modified Date: 2018-10-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: the tracing feature for services in microsoft windows vista sp1 and sp2, windows server 2008 gold, sp2, and r2, and windows 7 has incorrect acls on its registry keys, which allows local users to gain privileges via vectors involving a named pipe and impersonation, aka \"tracing registry key acl vulnerability.\"\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-08-11\nLast Modified Date: 2018-10-30",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Permissions Privileges and Access Controls
Summary: the ims server before ifix 6 in ibm security access manager for enterprise single sign-on (isam esso) 8.2 allows remote authenticated users to read log files by leveraging helpdesk privileges for a direct request.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2013-12-23
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Permissions Privileges and Access Controls\nSummary: the ims server before ifix 6 in ibm security access manager for enterprise single sign-on (isam esso) 8.2 allows remote authenticated users to read log files by leveraging helpdesk privileges for a direct request.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2013-12-23\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in the tiny event (tinyevent) 1.01 module for xoops allows remote attackers to execute arbitrary sql commands via the id parameter in a print action, a different vector than cve-2007-1811.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-02-25
Last Modified Date: 2008-09-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the tiny event (tinyevent) 1.01 module for xoops allows remote attackers to execute arbitrary sql commands via the id parameter in a print action, a different vector than cve-2007-1811.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-25\nLast Modified Date: 2008-09-05",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the jom comment 2.0 build 345 component for joomla! allows remote attackers to execute arbitrary sql commands via unspecified vectors. note: the provenance of this information is unknown; the details are obtained solely from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-04-18
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the jom comment 2.0 build 345 component for joomla! allows remote attackers to execute arbitrary sql commands via unspecified vectors. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-04-18\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Permissions Privileges and Access Controls
Summary: ibm maximo asset management 6.2 before 6.2.8, 7.1 before 7.1.1.12, and 7.5 before 7.5.0.3 allows remote attackers to gain privileges via unspecified vectors.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2013-10-01
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: ibm maximo asset management 6.2 before 6.2.8, 7.1 before 7.1.1.12, and 7.5 before 7.5.0.3 allows remote attackers to gain privileges via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-10-01\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: ibm financial transaction manager (ftm) for multi-platform (mp) 3.0.0.0 through 3.0.0.7 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 132926.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-11
Last Modified Date: 2017-12-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: ibm financial transaction manager (ftm) for multi-platform (mp) 3.0.0.0 through 3.0.0.7 is vulnerable to sql injection. a remote attacker could send specially-crafted sql statements, which could allow the attacker to view, add, modify or delete information in the back-end database. ibm x-force id: 132926.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-11\nLast Modified Date: 2017-12-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in products.php in the mytipper zogo-shop plugin 1.15.5 and 1.16 beta 13 for e107 allows remote attackers to execute arbitrary sql commands via the cat parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-05-27
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in products.php in the mytipper zogo-shop plugin 1.15.5 and 1.16 beta 13 for e107 allows remote attackers to execute arbitrary sql commands via the cat parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-27\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Improper Input Validation
Summary: the miss marple updater service in comparex miss marple enterprise edition before 2.0 allows remote attackers to execute arbitrary code with system privileges via vectors related to missing update validation.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-12-20
Last Modified Date: 2019-02-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Improper Input Validation\nSummary: the miss marple updater service in comparex miss marple enterprise edition before 2.0 allows remote attackers to execute arbitrary code with system privileges via vectors related to missing update validation.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-12-20\nLast Modified Date: 2019-02-07",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 5.8
CWE Name: Permissions Privileges and Access Controls
Summary: the securityassociation.getcredential method in jboss enterprise application platform (eap) before 5.2.0, web platform (ewp) before 5.2.0, brms platform before 5.3.1, and soa platform before 5.3.1 returns the credentials of the previous user when a security context is not provided, which allows remote attackers to gain privileges as other users.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/NONE
Published Date: 2013-02-05
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 5.8\nCWE Name: Permissions Privileges and Access Controls\nSummary: the securityassociation.getcredential method in jboss enterprise application platform (eap) before 5.2.0, web platform (ewp) before 5.2.0, brms platform before 5.3.1, and soa platform before 5.3.1 returns the credentials of the previous user when a security context is not provided, which allows remote attackers to gain privileges as other users.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2013-02-05\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in search_results.php in abk-soft abledating 2.4 allows remote attackers to execute arbitrary sql commands via the keyword parameter.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-03-31
Last Modified Date: 2018-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in search_results.php in abk-soft abledating 2.4 allows remote attackers to execute arbitrary sql commands via the keyword parameter.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-31\nLast Modified Date: 2018-10-11",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in aj matrix dna allows remote attackers to execute arbitrary sql commands via the id parameter in a productdetail action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-08-17
Last Modified Date: 2009-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in aj matrix dna allows remote attackers to execute arbitrary sql commands via the id parameter in a productdetail action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-08-17\nLast Modified Date: 2009-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in browseproject.php in freelance auction script 1.0 allows remote attackers to execute arbitrary sql commands via the pid parameter in a pdetails action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-05-16
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in browseproject.php in freelance auction script 1.0 allows remote attackers to execute arbitrary sql commands via the pid parameter in a pdetails action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-16\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in modules.php in the okul 1.0 module for php-nuke allows remote attackers to execute arbitrary sql commands via the okulid parameter in an okullar action. more information is available at the following securityfocus bid link: http://www.securityfocus.com/bid/27909/info
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-02-21
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in modules.php in the okul 1.0 module for php-nuke allows remote attackers to execute arbitrary sql commands via the okulid parameter in an okullar action. more information is available at the following securityfocus bid link: http://www.securityfocus.com/bid/27909/info\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-02-21\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: ibm informix dynamic server enterprise edition 12.1 could allow a local privileged informix user to load a malicious shared library and gain root access privileges. ibm x-force id: 159941.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-08-20
Last Modified Date: 2019-09-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: ibm informix dynamic server enterprise edition 12.1 could allow a local privileged informix user to load a malicious shared library and gain root access privileges. ibm x-force id: 159941.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-08-20\nLast Modified Date: 2019-09-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the qualcomm arm processor performance-event manager in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 allows attackers to gain privileges via a crafted application, aka internal bug 25801197.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-04-18
Last Modified Date: 2016-04-20 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the qualcomm arm processor performance-event manager in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 allows attackers to gain privileges via a crafted application, aka internal bug 25801197.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-04-18\nLast Modified Date: 2016-04-20",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in login.php in sample code in the xenserver resource kit in citrix xencenterweb allows remote attackers to execute arbitrary sql commands via the username parameter. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-10-22
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in login.php in sample code in the xenserver resource kit in citrix xencenterweb allows remote attackers to execute arbitrary sql commands via the username parameter. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-10-22\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: the prctl_set_vma_anon_name function in kernel/sys.c in android before 5.1.1 lmy49f and 6.0 before 2016-01-01 does not ensure that only one vma is accessed in a certain update action, which allows attackers to gain privileges or cause a denial of service (vma list corruption) via a crafted application, aka internal bug 20017123.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-01-06
Last Modified Date: 2016-12-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: the prctl_set_vma_anon_name function in kernel/sys.c in android before 5.1.1 lmy49f and 6.0 before 2016-01-01 does not ensure that only one vma is accessed in a certain update action, which allows attackers to gain privileges or cause a denial of service (vma list corruption) via a crafted application, aka internal bug 20017123.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-01-06\nLast Modified Date: 2016-12-07",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: the disk images component in apple ios before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-09-18
Last Modified Date: 2016-12-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: the disk images component in apple ios before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-09-18\nLast Modified Date: 2016-12-22",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in invohost 3.4 allow remote attackers to execute arbitrary sql commands via the (1) id and (2) newlanguage parameters to site.php, (3) search parameter to manuals.php, and (4) unspecified vectors to faq.php. note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-04-09
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in invohost 3.4 allow remote attackers to execute arbitrary sql commands via the (1) id and (2) newlanguage parameters to site.php, (3) search parameter to manuals.php, and (4) unspecified vectors to faq.php. note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-04-09\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in pixelpost 1.7 allows remote attackers to execute arbitrary sql commands via the parent_id parameter.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-01-18
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in pixelpost 1.7 allows remote attackers to execute arbitrary sql commands via the parent_id parameter.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-01-18\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: dlmfdisk.sys 1.2.0.27 in deslock+ 3.2.6 and earlier allows local users to gain privileges via a certain dlkfdisk_ioctl request to \\.\dlkfdisk_control that overwrites a data structure associated with a mounted pseudo-filesystem, aka the "ring0 system" vulnerability.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2008-03-04
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: dlmfdisk.sys 1.2.0.27 in deslock+ 3.2.6 and earlier allows local users to gain privileges via a certain dlkfdisk_ioctl request to \\\\.\\dlkfdisk_control that overwrites a data structure associated with a mounted pseudo-filesystem, aka the \"ring0 system\" vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2008-03-04\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Information Exposure
Summary: vulnerability in the peoplesoft enterprise pt peopletools component of oracle peoplesoft products (subcomponent: remotecall). supported versions that are affected are 8.55, 8.56 and 8.57. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise peoplesoft enterprise pt peopletools. successful attacks of this vulnerability can result in unauthorized read access to a subset of peoplesoft enterprise pt peopletools accessible data. cvss 3.0 base score 4.3 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:n).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-04-23
Last Modified Date: 2019-04-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Information Exposure\nSummary: vulnerability in the peoplesoft enterprise pt peopletools component of oracle peoplesoft products (subcomponent: remotecall). supported versions that are affected are 8.55, 8.56 and 8.57. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise peoplesoft enterprise pt peopletools. successful attacks of this vulnerability can result in unauthorized read access to a subset of peoplesoft enterprise pt peopletools accessible data. cvss 3.0 base score 4.3 (confidentiality impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:n/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-04-23\nLast Modified Date: 2019-04-25",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in showads.php in z1exchange allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-03-02
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in showads.php in z1exchange allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-03-02\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in login.asp in asp-dev internal e-mail system allow remote attackers to execute arbitrary sql commands via the (1) login parameter (aka user field) or the (2) password parameter (aka pass field). note: some of these details are obtained from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-01-21
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in login.asp in asp-dev internal e-mail system allow remote attackers to execute arbitrary sql commands via the (1) login parameter (aka user field) or the (2) password parameter (aka pass field). note: some of these details are obtained from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-01-21\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 255
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Credentials Management
Summary: dscl in ds tools in apple mac os x 10.4.11 and 10.5.6 requires that passwords must be provided as command line arguments, which allows local users to gain privileges by listing process information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2009-02-13
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Credentials Management.",
"role": "user"
},
{
"content": "CWE Code: 255\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Credentials Management\nSummary: dscl in ds tools in apple mac os x 10.4.11 and 10.5.6 requires that passwords must be provided as command line arguments, which allows local users to gain privileges by listing process information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2009-02-13\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in product_desc.php in pre printing press allows remote attackers to execute arbitrary sql commands via the pid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-10-08
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in product_desc.php in pre printing press allows remote attackers to execute arbitrary sql commands via the pid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-10-08\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.5
CWE Name: Improper Input Validation
Summary: adminlogin/password.php in the twitter clone (tclone) plugin for revou micro blogging does not verify the original password before changing passwords, which allows remote attackers to change the administrator's password and gain privileges via a direct request with modified newpass1 and newpass2 parameters in a change operation.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-04-24
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.5\nCWE Name: Improper Input Validation\nSummary: adminlogin/password.php in the twitter clone (tclone) plugin for revou micro blogging does not verify the original password before changing passwords, which allows remote attackers to change the administrator's password and gain privileges via a direct request with modified newpass1 and newpass2 parameters in a change operation.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-04-24\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 476
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: NULL Pointer Dereference
Summary: iohidfamily in apple ios before 9.3.3, os x before 10.11.6, tvos before 9.2.2, and watchos before 2.2.2 allows local users to gain privileges or cause a denial of service (null pointer dereference) via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-07-22
Last Modified Date: 2019-03-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: NULL Pointer Dereference.",
"role": "user"
},
{
"content": "CWE Code: 476\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: NULL Pointer Dereference\nSummary: iohidfamily in apple ios before 9.3.3, os x before 10.11.6, tvos before 9.2.2, and watchos before 2.2.2 allows local users to gain privileges or cause a denial of service (null pointer dereference) via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-07-22\nLast Modified Date: 2019-03-25",
"role": "assistant"
}
] |
CWE Code: 275
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permission Issues
Summary: polycom btoe connector before 3.0.0 uses weak permissions (everyone: full control) for "program files (x86)\polycom\polycom btoe connector\plcmbtoesrv.exe," which allows local users to gain privileges via a trojan horse file.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-08-28
Last Modified Date: 2018-09-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permission Issues.",
"role": "user"
},
{
"content": "CWE Code: 275\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permission Issues\nSummary: polycom btoe connector before 3.0.0 uses weak permissions (everyone: full control) for \"program files (x86)\\polycom\\polycom btoe connector\\plcmbtoesrv.exe,\" which allows local users to gain privileges via a trojan horse file.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-08-28\nLast Modified Date: 2018-09-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the content://wappush content provider in com.android.provider.telephony, as found in some custom roms for android phones, allows sql injection. one consequence is that an application without the read_sms permission can read sms messages. this affects infinix x571 phones, as well as various lenovo phones (such as the a7020) that have since been fixed by lenovo.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-07-15
Last Modified Date: 2018-09-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the content://wappush content provider in com.android.provider.telephony, as found in some custom roms for android phones, allows sql injection. one consequence is that an application without the read_sms permission can read sms messages. this affects infinix x571 phones, as well as various lenovo phones (such as the a7020) that have since been fixed by lenovo.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-07-15\nLast Modified Date: 2018-09-21",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Information Exposure
Summary: an information disclosure vulnerability in qualcomm components including the gpu driver, power driver, smsm point-to-point driver, and sound driver in android before 2016-11-05 could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. android id: a-30902162. references: qualcomm qc-cr#1062271.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2016-11-25
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Information Exposure\nSummary: an information disclosure vulnerability in qualcomm components including the gpu driver, power driver, smsm point-to-point driver, and sound driver in android before 2016-11-05 could enable a local malicious application to access data outside of its permission levels. this issue is rated as moderate because it first requires compromising a privileged process. android id: a-30902162. references: qualcomm qc-cr#1062271.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2016-11-25\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Access Control
Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 5.7.24 and prior and 8.0.13 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-01-16
Last Modified Date: 2019-08-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Access Control\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 5.7.24 and prior and 8.0.13 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-01-16\nLast Modified Date: 2019-08-14",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: incorrect access control in the cxutilsvc component of the synaptics sound device drivers prior to version 2.29 allows a local attacker to increase access privileges to the windows registry via an unpublished api.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-06-05
Last Modified Date: 2019-06-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: incorrect access control in the cxutilsvc component of the synaptics sound device drivers prior to version 2.29 allows a local attacker to increase access privileges to the windows registry via an unpublished api.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-06-05\nLast Modified Date: 2019-06-07",
"role": "assistant"
}
] |
CWE Code: 787
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Out-of-bounds Write
Summary: in libxaac there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-117495103
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-09-27
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Write.",
"role": "user"
},
{
"content": "CWE Code: 787\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Out-of-bounds Write\nSummary: in libxaac there is a possible out of bounds write due to a missing bounds check. this could lead to remote code execution with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-117495103\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 9.3
CWE Name: Permissions Privileges and Access Controls
Summary: an elevation of privilege vulnerability in the nvidia gpu driver in android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. android id: a-30907120. references: nvidia n-cve-2016-6734.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-11-25
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 9.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability in the nvidia gpu driver in android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. this issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. android id: a-30907120. references: nvidia n-cve-2016-6734.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-11-25\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 6.8
CWE Name: Improper Input Validation
Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 8.0.16 and prior. easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 6.5 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:n/i:n/a:h).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/COMPLETE
Published Date: 2019-07-23
Last Modified Date: 2019-08-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.8\nCWE Name: Improper Input Validation\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 8.0.16 and prior. easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 6.5 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/COMPLETE\nPublished Date: 2019-07-23\nLast Modified Date: 2019-08-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: dayrui finecms 5.0.9 has sql injection via the num parameter in an action=related or action=tags request to libraries/template.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-07-24
Last Modified Date: 2017-07-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: dayrui finecms 5.0.9 has sql injection via the num parameter in an action=related or action=tags request to libraries/template.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-07-24\nLast Modified Date: 2017-07-27",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in report.php in mr. cgi guy hot links sql-php 3.0 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-01
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in report.php in mr. cgi guy hot links sql-php 3.0 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-01\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 6.2
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: race condition in the creation of a unix domain socket in gnome esound 0.2.19 and earlier allows a local user to change the permissions of arbitrary files and directories, and gain additional privileges, via a symlink attack.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2000-11-14
Last Modified Date: 2017-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 6.2\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: race condition in the creation of a unix domain socket in gnome esound 0.2.19 and earlier allows a local user to change the permissions of arbitrary files and directories, and gain additional privileges, via a symlink attack.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2000-11-14\nLast Modified Date: 2017-10-10",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Permissions Privileges and Access Controls
Summary: hpe arcsight esm 5.x before 5.6, 6.0, 6.5.x before 6.5c sp1 patch 2, and 6.8c before p1, and arcsight esm express before 6.9.1, allows local users to gain privileges for command execution via unspecified vectors.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-03-16
Last Modified Date: 2018-10-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Permissions Privileges and Access Controls\nSummary: hpe arcsight esm 5.x before 5.6, 6.0, 6.5.x before 6.5c sp1 patch 2, and 6.8c before p1, and arcsight esm express before 6.9.1, allows local users to gain privileges for command execution via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-03-16\nLast Modified Date: 2018-10-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the trips (mchtrips) extension 2.0.0 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-12-02
Last Modified Date: 2009-12-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the trips (mchtrips) extension 2.0.0 for typo3 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-12-02\nLast Modified Date: 2009-12-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: an issue was discovered in dolibarr through 7.0.0. expensereport/card.php in the expense reports module allows sql injection via the integer parameters qty and value_unit.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-03-07
Last Modified Date: 2019-03-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: an issue was discovered in dolibarr through 7.0.0. expensereport/card.php in the expense reports module allows sql injection via the integer parameters qty and value_unit.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-03-07\nLast Modified Date: 2019-03-08",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Input Validation
Summary: the utf8_decode function in php before 5.3.4 does not properly handle non-shortest form utf-8 encoding and ill-formed subsequences in utf-8 data, which makes it easier for remote attackers to bypass cross-site scripting (xss) and sql injection protection mechanisms via a crafted string.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-11-12
Last Modified Date: 2018-10-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Input Validation\nSummary: the utf8_decode function in php before 5.3.4 does not properly handle non-shortest form utf-8 encoding and ill-formed subsequences in utf-8 data, which makes it easier for remote attackers to bypass cross-site scripting (xss) and sql injection protection mechanisms via a crafted string.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-11-12\nLast Modified Date: 2018-10-30",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: buffer overflow in the create_pbuf function in btif/src/btif_hh.c in bluetooth in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows remote attackers to gain privileges via a crafted pairing operation, aka internal bug 27930580.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-07-11
Last Modified Date: 2016-07-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: buffer overflow in the create_pbuf function in btif/src/btif_hh.c in bluetooth in android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows remote attackers to gain privileges via a crafted pairing operation, aka internal bug 27930580.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-07-11\nLast Modified Date: 2016-07-11",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the kernel-mode drivers in microsoft windows vista sp2; windows server 2008 sp2 and r2 sp1; windows 7 sp1; windows 8.1; windows server 2012 gold and r2; windows rt 8.1; and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "win32k elevation of privilege vulnerability," a different vulnerability than cve-2016-3309, cve-2016-3310, and cve-2016-3311.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-08-09
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the kernel-mode drivers in microsoft windows vista sp2; windows server 2008 sp2 and r2 sp1; windows 7 sp1; windows 8.1; windows server 2012 gold and r2; windows rt 8.1; and windows 10 gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka \"win32k elevation of privilege vulnerability,\" a different vulnerability than cve-2016-3309, cve-2016-3310, and cve-2016-3311.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-08-09\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
Subsets and Splits