text
stringlengths 365
3.97k
| conversations
listlengths 3
3
|
---|---|
CWE Code: 352
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Cross-Site Request Forgery (CSRF)
Summary: multiple cross-site request forgery (csrf) vulnerabilities in the admin panel in oscmax before 2.5.1 allow remote attackers to hijack the authentication of administrators for requests that conduct sql injection attacks via the (1) status parameter to admin/stats_monthly_sales.php or (2) country parameter in a process action to admin/create_account_process.php.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-05-20
Last Modified Date: 2015-07-27 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Cross-Site Request Forgery (CSRF).",
"role": "user"
},
{
"content": "CWE Code: 352\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Cross-Site Request Forgery (CSRF)\nSummary: multiple cross-site request forgery (csrf) vulnerabilities in the admin panel in oscmax before 2.5.1 allow remote attackers to hijack the authentication of administrators for requests that conduct sql injection attacks via the (1) status parameter to admin/stats_monthly_sales.php or (2) country parameter in a process action to admin/create_account_process.php.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-05-20\nLast Modified Date: 2015-07-27",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in index.php in jurpopage 0.2.0 allow remote attackers to execute arbitrary sql commands via the (1) note and (2) pg parameters, different vectors than cve-2010-4359. note: the provenance of this information is unknown; the details are obtained solely from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-12-01
Last Modified Date: 2010-12-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in jurpopage 0.2.0 allow remote attackers to execute arbitrary sql commands via the (1) note and (2) pg parameters, different vectors than cve-2010-4359. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-12-01\nLast Modified Date: 2010-12-02",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Privilege Management
Summary: an issue was discovered in oxygenos before 4.0.3 for oneplus 3 and 3t. the attacker can persistently make the (locked) bootloader start the platform with dm-verity disabled, by issuing the 'fastboot oem disable_dm_verity' command. having dm-verity disabled, the kernel will not verify the system partition (and any other dm-verity protected partition), which may allow for persistent code execution and privilege escalation.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-03-12
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Privilege Management\nSummary: an issue was discovered in oxygenos before 4.0.3 for oneplus 3 and 3t. the attacker can persistently make the (locked) bootloader start the platform with dm-verity disabled, by issuing the 'fastboot oem disable_dm_verity' command. having dm-verity disabled, the kernel will not verify the system partition (and any other dm-verity protected partition), which may allow for persistent code execution and privilege escalation.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-03-12\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in frontend/models/techfoliodetail.php in techfolio (com_techfolio) component 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2012-08-23
Last Modified Date: 2012-08-24 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in frontend/models/techfoliodetail.php in techfolio (com_techfolio) component 1.0 for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2012-08-23\nLast Modified Date: 2012-08-24",
"role": "assistant"
}
] |
CWE Code: 306
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Missing Authentication for Critical Function
Summary: in apache impala 2.7.0 to 3.2.0, an authenticated user with access to the ids of active impala queries or sessions can interact with those sessions or queries via a specially-constructed request and thereby potentially bypass authorization and audit mechanisms. session and query ids are unique and random, but have not been documented or consistently treated as sensitive secrets. therefore they may be exposed in logs or interfaces. they were also not generated with a cryptographically secure random number generator, so are vulnerable to random number generator attacks that predict future ids based on past ids. impala deployments with apache sentry or apache ranger authorization enabled may be vulnerable to privilege escalation if an authenticated attacker is able to hijack a session or query from another authenticated user with privileges not assigned to the attacker. impala deployments with audit logging enabled may be vulnerable to incorrect audit logging as a user could undertake actions that were logged under the name of a different authenticated user. constructing an attack requires a high degree of technical sophistication and access to the impala system as an authenticated user.
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-05
Last Modified Date: 2019-11-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Missing Authentication for Critical Function.",
"role": "user"
},
{
"content": "CWE Code: 306\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Missing Authentication for Critical Function\nSummary: in apache impala 2.7.0 to 3.2.0, an authenticated user with access to the ids of active impala queries or sessions can interact with those sessions or queries via a specially-constructed request and thereby potentially bypass authorization and audit mechanisms. session and query ids are unique and random, but have not been documented or consistently treated as sensitive secrets. therefore they may be exposed in logs or interfaces. they were also not generated with a cryptographically secure random number generator, so are vulnerable to random number generator attacks that predict future ids based on past ids. impala deployments with apache sentry or apache ranger authorization enabled may be vulnerable to privilege escalation if an authenticated attacker is able to hijack a session or query from another authenticated user with privileges not assigned to the attacker. impala deployments with audit logging enabled may be vulnerable to incorrect audit logging as a user could undertake actions that were logged under the name of a different authenticated user. constructing an attack requires a high degree of technical sophistication and access to the impala system as an authenticated user.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-05\nLast Modified Date: 2019-11-05",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in pages.php in multishop cms allows remote attackers to execute arbitrary sql commands via the id parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-06-02
Last Modified Date: 2010-06-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in pages.php in multishop cms allows remote attackers to execute arbitrary sql commands via the id parameter. note: the provenance of this information is unknown; the details are obtained solely from third party information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-06-02\nLast Modified Date: 2010-06-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: schedmd slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows sql injection.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-07-11
Last Modified Date: 2019-07-24 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: schedmd slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows sql injection.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-07-11\nLast Modified Date: 2019-07-24",
"role": "assistant"
}
] |
CWE Code: 200
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Information Exposure
Summary: vulnerability in the solaris component of oracle sun systems products suite (subcomponent: kernel). the supported version that is affected is 11.3. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where solaris executes to compromise solaris. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all solaris accessible data. cvss 3.0 base score 5.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2018-01-18
Last Modified Date: 2018-01-25 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Information Exposure.",
"role": "user"
},
{
"content": "CWE Code: 200\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Information Exposure\nSummary: vulnerability in the solaris component of oracle sun systems products suite (subcomponent: kernel). the supported version that is affected is 11.3. easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where solaris executes to compromise solaris. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all solaris accessible data. cvss 3.0 base score 5.5 (confidentiality impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:h/i:n/a:n).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-01-18\nLast Modified Date: 2018-01-25",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.4
CWE Name: Permissions Privileges and Access Controls
Summary: polycom realpresence resource manager (aka rprm) before 8.4 allows local users with access to the plcm account to gain privileges via a script in /var/polycom/cma/upgrade/scripts, related to a sudo misconfiguration.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-09-19
Last Modified Date: 2018-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Permissions Privileges and Access Controls\nSummary: polycom realpresence resource manager (aka rprm) before 8.4 allows local users with access to the plcm account to gain privileges via a script in /var/polycom/cma/upgrade/scripts, related to a sudo misconfiguration.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-09-19\nLast Modified Date: 2018-10-09",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the issetugid system call in the linux compatibility layer in freebsd 9.3, 10.1, and 10.2 allows local users to gain privilege via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-02-15
Last Modified Date: 2017-02-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the issetugid system call in the linux compatibility layer in freebsd 9.3, 10.1, and 10.2 allows local users to gain privilege via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-02-15\nLast Modified Date: 2017-02-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the wikiwiki module before 6.x-1.2 for drupal allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-04-21
Last Modified Date: 2016-12-06 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the wikiwiki module before 6.x-1.2 for drupal allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-04-21\nLast Modified Date: 2016-12-06",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in class.ajax.php in turnkey web tools sunshop shopping cart before 4.1.5 allow remote attackers to execute arbitrary sql commands via (1) the id parameter in an edit_registry action to index.php, (2) a vector involving the check_email function, and other vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-08-22
Last Modified Date: 2018-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in class.ajax.php in turnkey web tools sunshop shopping cart before 4.1.5 allow remote attackers to execute arbitrary sql commands via (1) the id parameter in an edit_registry action to index.php, (2) a vector involving the check_email function, and other vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-22\nLast Modified Date: 2018-10-11",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: sql_injection
CVSS Score: 5.0
CWE Name: Improper Input Validation
Summary: the field_test gem 0.3.0 for ruby has unvalidated input. a method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. if an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like sql injection or cross-site scripting (xss).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2019-07-09
Last Modified Date: 2019-07-16 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Improper Input Validation\nSummary: the field_test gem 0.3.0 for ruby has unvalidated input. a method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. if an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like sql injection or cross-site scripting (xss).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-07-09\nLast Modified Date: 2019-07-16",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: a sql injection in classes/handler/public.php in the forgotpass component of tiny tiny rss 17.4 exists via the login parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-11-20
Last Modified Date: 2017-12-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: a sql injection in classes/handler/public.php in the forgotpass component of tiny tiny rss 17.4 exists via the login parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-11-20\nLast Modified Date: 2017-12-05",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: esruncommand in ibm omnifind enterprise edition before 9.1 allows local users to gain privileges by specifying an arbitrary command name as the first argument.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-11-12
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: esruncommand in ibm omnifind enterprise edition before 9.1 allows local users to gain privileges by specifying an arbitrary command name as the first argument.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-11-12\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in community cms 0.4 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-03
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in community cms 0.4 and earlier allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-03\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection exists in nexusphp 1.5.beta5.20120707 via the usernw array parameter to nowarn.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-08-31
Last Modified Date: 2017-09-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection exists in nexusphp 1.5.beta5.20120707 via the usernw array parameter to nowarn.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-08-31\nLast Modified Date: 2017-09-07",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the pulse infotech sponsor wall (com_sponsorwall) component 1.1 for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-11-17
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the pulse infotech sponsor wall (com_sponsorwall) component 1.1 for joomla! allows remote attackers to execute arbitrary sql commands via the catid parameter to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-11-17\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: buffer overflow in src/openttd.cpp in openttd before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the "-g" parameter in the ttd_main function. note: it is unlikely that this issue would cross privilege boundaries in typical environments.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-08-10
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: buffer overflow in src/openttd.cpp in openttd before 0.6.2 allows local users to execute arbitrary code via a large filename supplied to the \"-g\" parameter in the ttd_main function. note: it is unlikely that this issue would cross privilege boundaries in typical environments.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-08-10\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 5.0
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: in /framework/modules/core/controllers/exphtmleditorcontroller.php of exponent cms 2.4.0, untrusted input is used to construct a table name, and in the selectobject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for sql injection. impact is information disclosure.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2016-11-04
Last Modified Date: 2016-11-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.0\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: in /framework/modules/core/controllers/exphtmleditorcontroller.php of exponent cms 2.4.0, untrusted input is used to construct a table name, and in the selectobject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for sql injection. impact is information disclosure.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2016-11-04\nLast Modified Date: 2016-11-29",
"role": "assistant"
}
] |
CWE Code: 522
Vulnerability Type: privilege_escalation
CVSS Score: 5.0
CWE Name: Insufficiently Protected Credentials
Summary: a password in configuration file issue was discovered in dahua dh-ipc-hdbw23a0rn-zs, dh-ipc-hdbw13a0sn, dh-ipc-hdw1xxx, dh-ipc-hdw2xxx, dh-ipc-hdw4xxx, dh-ipc-hfw1xxx, dh-ipc-hfw2xxx, dh-ipc-hfw4xxx, dh-sd6cxx, dh-nvr1xxx, dh-hcvr4xxx, dh-hcvr5xxx, dhi-hcvr51a04he-s3, dhi-hcvr51a08he-s3, and dhi-hcvr58a32s-s2 devices. the password in configuration file vulnerability was identified, which could lead to a malicious user assuming the identity of a privileged user and gaining access to sensitive information.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2017-05-06
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Insufficiently Protected Credentials.",
"role": "user"
},
{
"content": "CWE Code: 522\nVulnerability Type: privilege_escalation\nCVSS Score: 5.0\nCWE Name: Insufficiently Protected Credentials\nSummary: a password in configuration file issue was discovered in dahua dh-ipc-hdbw23a0rn-zs, dh-ipc-hdbw13a0sn, dh-ipc-hdw1xxx, dh-ipc-hdw2xxx, dh-ipc-hdw4xxx, dh-ipc-hfw1xxx, dh-ipc-hfw2xxx, dh-ipc-hfw4xxx, dh-sd6cxx, dh-nvr1xxx, dh-hcvr4xxx, dh-hcvr5xxx, dhi-hcvr51a04he-s3, dhi-hcvr51a08he-s3, and dhi-hcvr58a32s-s2 devices. the password in configuration file vulnerability was identified, which could lead to a malicious user assuming the identity of a privileged user and gaining access to sensitive information.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2017-05-06\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in form.php in webmember 1.0 allows remote authenticated users to execute arbitrary sql commands via the formid parameter.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-03-05
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in form.php in webmember 1.0 allows remote authenticated users to execute arbitrary sql commands via the formid parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-03-05\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the miniicpt.sys driver in g data totalprotection 2014 24.0.2.1 and earlier allows local users with administrator rights to execute arbitrary code with system privileges via a crafted 0x83170180 call.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-02-01
Last Modified Date: 2018-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the miniicpt.sys driver in g data totalprotection 2014 24.0.2.1 and earlier allows local users with administrator rights to execute arbitrary code with system privileges via a crafted 0x83170180 call.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-02-01\nLast Modified Date: 2018-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in persian car cms 1.0 allows remote attackers to execute arbitrary sql commands via the cat_id parameter to the default uri.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-06-19
Last Modified Date: 2016-12-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in persian car cms 1.0 allows remote attackers to execute arbitrary sql commands via the cat_id parameter to the default uri.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-06-19\nLast Modified Date: 2016-12-07",
"role": "assistant"
}
] |
CWE Code: 522
Vulnerability Type: privilege_escalation
CVSS Score: 3.3
CWE Name: Insufficiently Protected Credentials
Summary: dell emc networker versions between 9.0 and 9.1.1.8 through 9.2.1.3, and the version 18.1.0.1 contain a clear-text authentication over network vulnerability in the rabbit mq advanced message queuing protocol (amqp) component. user credentials are sent unencrypted to the remote amqp service. an unauthenticated attacker in the same network collision domain, could potentially sniff the password from the network and use it to access the component using the privileges of the compromised user.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2018-08-01
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Insufficiently Protected Credentials.",
"role": "user"
},
{
"content": "CWE Code: 522\nVulnerability Type: privilege_escalation\nCVSS Score: 3.3\nCWE Name: Insufficiently Protected Credentials\nSummary: dell emc networker versions between 9.0 and 9.1.1.8 through 9.2.1.3, and the version 18.1.0.1 contain a clear-text authentication over network vulnerability in the rabbit mq advanced message queuing protocol (amqp) component. user credentials are sent unencrypted to the remote amqp service. an unauthenticated attacker in the same network collision domain, could potentially sniff the password from the network and use it to access the component using the privileges of the compromised user.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2018-08-01\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 79
Vulnerability Type: privilege_escalation
CVSS Score: 3.5
CWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary: in sitecore 9.0 rev 171002, persistent xss exists in the media library and file manager. an authenticated unprivileged user can modify the uploaded file extension parameter to inject arbitrary javascript.
Access Authentication: SINGLE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2019-07-17
Last Modified Date: 2019-07-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').",
"role": "user"
},
{
"content": "CWE Code: 79\nVulnerability Type: privilege_escalation\nCVSS Score: 3.5\nCWE Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSummary: in sitecore 9.0 rev 171002, persistent xss exists in the media library and file manager. an authenticated unprivileged user can modify the uploaded file extension parameter to inject arbitrary javascript.\nAccess Authentication: SINGLE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-07-17\nLast Modified Date: 2019-07-18",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 3.6
CWE Name: Permissions Privileges and Access Controls
Summary: vulnerability in the oracle hospitality reporting and analytics component of oracle food and beverage applications. the supported version that is affected is 9.1.0. easily exploitable vulnerability allows low privileged attacker having report privilege with logon to the infrastructure where oracle hospitality reporting and analytics executes to compromise oracle hospitality reporting and analytics. successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of oracle hospitality reporting and analytics accessible data as well as unauthorized read access to a subset of oracle hospitality reporting and analytics accessible data. cvss 3.0 base score 4.4 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:l/i:l/a:n).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/NONE
Published Date: 2019-01-16
Last Modified Date: 2019-01-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 3.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: vulnerability in the oracle hospitality reporting and analytics component of oracle food and beverage applications. the supported version that is affected is 9.1.0. easily exploitable vulnerability allows low privileged attacker having report privilege with logon to the infrastructure where oracle hospitality reporting and analytics executes to compromise oracle hospitality reporting and analytics. successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of oracle hospitality reporting and analytics accessible data as well as unauthorized read access to a subset of oracle hospitality reporting and analytics accessible data. cvss 3.0 base score 4.4 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:l/ac:l/pr:l/ui:n/s:u/c:l/i:l/a:n).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2019-01-16\nLast Modified Date: 2019-01-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in news.php in advanced webhost billing system (awbs) 2.3.3 through 2.7.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the viewnews parameter.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-06-30
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in news.php in advanced webhost billing system (awbs) 2.3.3 through 2.7.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the viewnews parameter.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-30\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.4
CWE Name: Permissions Privileges and Access Controls
Summary: ibm websphere application server (was) 8.5 before 8.5.5.6, and websphere virtual enterprise 7.0 before 7.0.0.6 for websphere application server (was) 7.0 and 8.0, does not properly implement user roles, which allows local users to gain privileges via unspecified vectors.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-07-14
Last Modified Date: 2016-11-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Permissions Privileges and Access Controls\nSummary: ibm websphere application server (was) 8.5 before 8.5.5.6, and websphere virtual enterprise 7.0 before 7.0.0.6 for websphere application server (was) 7.0 and 8.0, does not properly implement user roles, which allows local users to gain privileges via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-07-14\nLast Modified Date: 2016-11-28",
"role": "assistant"
}
] |
CWE Code: 922
Vulnerability Type: privilege_escalation
CVSS Score: 9.0
CWE Name: Insecure Storage of Sensitive Information
Summary: dahua ip camera devices 3.200.0001.6 can be exploited via these steps: 1. use the default low-privilege credentials to list all users via a request to a certain uri. 2. login to the ip camera with admin credentials so as to obtain full control of the target ip camera. during exploitation, the first json object encountered has a "component error: login challenge!" message. the second json object encountered has a result indicating a successful admin login.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-03-30
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Insecure Storage of Sensitive Information.",
"role": "user"
},
{
"content": "CWE Code: 922\nVulnerability Type: privilege_escalation\nCVSS Score: 9.0\nCWE Name: Insecure Storage of Sensitive Information\nSummary: dahua ip camera devices 3.200.0001.6 can be exploited via these steps: 1. use the default low-privilege credentials to list all users via a request to a certain uri. 2. login to the ip camera with admin credentials so as to obtain full control of the target ip camera. during exploitation, the first json object encountered has a \"component error: login challenge!\" message. the second json object encountered has a result indicating a successful admin login.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-03-30\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the techjoomla socialads for jomsocial (com_socialads) component for joomla! allows remote attackers to execute arbitrary sql commands via the ads description field in a showad action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-11-01
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the techjoomla socialads for jomsocial (com_socialads) component for joomla! allows remote attackers to execute arbitrary sql commands via the ads description field in a showad action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-01\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the enterprise console in cisco appdynamics app iq platform before 4.4.3.10598 (hf4) allows sql injection, aka the security advisory 2089 issue.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-06-08
Last Modified Date: 2019-03-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the enterprise console in cisco appdynamics app iq platform before 4.4.3.10598 (hf4) allows sql injection, aka the security advisory 2089 issue.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-06-08\nLast Modified Date: 2019-03-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the administrative web interface in cisco unified communications manager allows remote authenticated users to execute arbitrary sql commands via a crafted response, aka bug id cscup88089.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-10-31
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the administrative web interface in cisco unified communications manager allows remote authenticated users to execute arbitrary sql commands via a crafted response, aka bug id cscup88089.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-10-31\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in bp blog 6.0 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to template_permalink.asp and (2) cat parameter to template_archives_cat.asp.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-06-05
Last Modified Date: 2018-10-11 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in bp blog 6.0 allow remote attackers to execute arbitrary sql commands via the (1) id parameter to template_permalink.asp and (2) cat parameter to template_archives_cat.asp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-05\nLast Modified Date: 2018-10-11",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the cybozu garoon 4.0.0 to 4.10.3 allows remote authenticated attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-09-12
Last Modified Date: 2019-09-13 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the cybozu garoon 4.0.0 to 4.10.3 allows remote authenticated attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-09-12\nLast Modified Date: 2019-09-13",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in poll_vote.php in igaming cms 1.5 allows remote attackers to execute arbitrary sql commands via the id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-05-09
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in poll_vote.php in igaming cms 1.5 allows remote attackers to execute arbitrary sql commands via the id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-05-09\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: ibm db2 high performance unload load for luw 6.1, 6.1.0.1, 6.1.0.1 if1, 6.1.0.2, 6.1.0.2 if1, and 6.1.0.1 if2 db2hpum and db2hpum_debug binaries are setuid root and have built-in options that allow an low privileged user the ability to load arbitrary db2 libraries from a privileged context. this results in arbitrary code being executed with root authority. ibm x-force id: 163489.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-08-26
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: ibm db2 high performance unload load for luw 6.1, 6.1.0.1, 6.1.0.1 if1, 6.1.0.2, 6.1.0.2 if1, and 6.1.0.1 if2 db2hpum and db2hpum_debug binaries are setuid root and have built-in options that allow an low privileged user the ability to load arbitrary db2 libraries from a privileged context. this results in arbitrary code being executed with root authority. ibm x-force id: 163489.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-08-26\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Privilege Management
Summary: an elevation of privilege vulnerability exists when the windows graphics component improperly handles objects in memory, aka 'windows graphics component elevation of privilege vulnerability'. this cve id is unique from cve-2019-1407, cve-2019-1433, cve-2019-1437, cve-2019-1438.
Access Authentication: NONE
Access Complexity: UNKNOWN
Access Vector: UNKNOWN
Impact (C/I/A): NONE/NONE/NONE
Published Date: 2019-11-12
Last Modified Date: 2019-11-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Privilege Management\nSummary: an elevation of privilege vulnerability exists when the windows graphics component improperly handles objects in memory, aka 'windows graphics component elevation of privilege vulnerability'. this cve id is unique from cve-2019-1407, cve-2019-1433, cve-2019-1437, cve-2019-1438.\nAccess Authentication: NONE\nAccess Complexity: UNKNOWN\nAccess Vector: UNKNOWN\nImpact (C/I/A): NONE/NONE/NONE\nPublished Date: 2019-11-12\nLast Modified Date: 2019-11-12",
"role": "assistant"
}
] |
CWE Code: 78
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands on the underlying linux operating system of an attached line card with the privilege level of root. the vulnerability is due to insufficient validation of arguments passed to a specific cli command on the affected device. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying linux operating system of an attached line card with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-05-15
Last Modified Date: 2019-05-21 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').",
"role": "user"
},
{
"content": "CWE Code: 78\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nSummary: a vulnerability in the cli of cisco nx-os software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands on the underlying linux operating system of an attached line card with the privilege level of root. the vulnerability is due to insufficient validation of arguments passed to a specific cli command on the affected device. an attacker could exploit this vulnerability by including malicious input as the argument of an affected command. a successful exploit could allow the attacker to execute arbitrary commands on the underlying linux operating system of an attached line card with elevated privileges. an attacker would need valid administrator credentials to exploit this vulnerability.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-05-15\nLast Modified Date: 2019-05-21",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Permissions Privileges and Access Controls
Summary: cisco nx-os 7.0(1)n1(1), 7.0(1)n1(3), and 7.0(4)n1(1) on nexus 2000 fabric extender devices has a blank root password, which allows local users to gain privileges via unspecified vectors, aka bug id cscur22079.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2016-02-24
Last Modified Date: 2016-12-06 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: cisco nx-os 7.0(1)n1(1), 7.0(1)n1(3), and 7.0(4)n1(1) on nexus 2000 fabric extender devices has a blank root password, which allows local users to gain privileges via unspecified vectors, aka bug id cscur22079.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2016-02-24\nLast Modified Date: 2016-12-06",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.4
CWE Name: Permissions Privileges and Access Controls
Summary: xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the xen security module (xsm) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2013-04-12
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Permissions Privileges and Access Controls\nSummary: xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running \"under memory pressure\" and the xen security module (xsm) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2013-04-12\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: entrepreneur job portal script 2.0.6 has sql injection via the jobsearch_all.php rid1 parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-12-13
Last Modified Date: 2017-12-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: entrepreneur job portal script 2.0.6 has sql injection via the jobsearch_all.php rid1 parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-12-13\nLast Modified Date: 2017-12-22",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in ask_chat.php in efront 3.6.2 and earlier allows remote attackers to execute arbitrary sql commands via the chatrooms_id parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-05-12
Last Modified Date: 2010-05-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in ask_chat.php in efront 3.6.2 and earlier allows remote attackers to execute arbitrary sql commands via the chatrooms_id parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-05-12\nLast Modified Date: 2010-05-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in members.php in battle.net clan script for php 1.5.3 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the showmember parameter in a members action.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-06-03
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in members.php in battle.net clan script for php 1.5.3 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary sql commands via the showmember parameter in a members action.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-06-03\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: zoneminder through 1.32.3 has sql injection via the skins/classic/views/events.php filter[query][terms][0][cnj] parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-02-18
Last Modified Date: 2019-02-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: zoneminder through 1.32.3 has sql injection via the skins/classic/views/events.php filter[query][terms][0][cnj] parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-02-18\nLast Modified Date: 2019-02-19",
"role": "assistant"
}
] |
CWE Code: 732
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Incorrect Permission Assignment for Critical Resource
Summary: tunnelbear 3.2.0.6 for windows suffers from a system privilege escalation vulnerability through the "tunnelbearmaintenance" service. this service establishes a netnamedpipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. the "openvpnconnect" method accepts a server list argument that provides attacker control of the openvpn command line. an attacker can specify a dynamic library plugin that should run for every new vpn connection attempt. this plugin will execute code in the context of the system user.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-04-26
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.",
"role": "user"
},
{
"content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: tunnelbear 3.2.0.6 for windows suffers from a system privilege escalation vulnerability through the \"tunnelbearmaintenance\" service. this service establishes a netnamedpipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. the \"openvpnconnect\" method accepts a server list argument that provides attacker control of the openvpn command line. an attacker can specify a dynamic library plugin that should run for every new vpn connection attempt. this plugin will execute code in the context of the system user.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-04-26\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the cwguestbook module 2.1 and earlier for maxdev mdpro (aka md-pro) allows remote attackers to execute arbitrary sql commands via the rid parameter in a viewrecords action to modules.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-07-02
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the cwguestbook module 2.1 and earlier for maxdev mdpro (aka md-pro) allows remote attackers to execute arbitrary sql commands via the rid parameter in a viewrecords action to modules.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-07-02\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the "site browser > html pages" screen in dotcms before 3.3.1 allows remote authenticated attackers to execute arbitrary sql commands via the orderby parameter.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-11-14
Last Modified Date: 2016-11-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the \"site browser > html pages\" screen in dotcms before 3.3.1 allows remote authenticated attackers to execute arbitrary sql commands via the orderby parameter.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-11-14\nLast Modified Date: 2016-11-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in plugins/search/search.php in neocrome seditio cms 121 and earlier allows remote attackers to execute arbitrary sql commands via the pag_sub[] parameter to plug.php. successful exploitation requires that "magic_quotes_gpc" is disabled.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-12-01
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in plugins/search/search.php in neocrome seditio cms 121 and earlier allows remote attackers to execute arbitrary sql commands via the pag_sub[] parameter to plug.php. successful exploitation requires that \"magic_quotes_gpc\" is disabled.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-12-01\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 5.5
CWE Name: Improper Access Control
Summary: vulnerability in the oracle flexcube investor servicing component of oracle financial services applications (subcomponent: infrastructure). supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle flexcube investor servicing. successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of oracle flexcube investor servicing accessible data as well as unauthorized read access to a subset of oracle flexcube investor servicing accessible data. cvss 3.0 base score 5.4 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:l/a:n).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/NONE
Published Date: 2019-07-23
Last Modified Date: 2019-07-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle flexcube investor servicing component of oracle financial services applications (subcomponent: infrastructure). supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. easily exploitable vulnerability allows low privileged attacker with network access via http to compromise oracle flexcube investor servicing. successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of oracle flexcube investor servicing accessible data as well as unauthorized read access to a subset of oracle flexcube investor servicing accessible data. cvss 3.0 base score 5.4 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:l/ui:n/s:u/c:l/i:l/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2019-07-23\nLast Modified Date: 2019-07-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in index.php in the darko selesi estateagent (com_estateagent) 0.1 component for mambo 4.5.x and joomla! allows remote attackers to execute arbitrary sql commands via the objid parameter in a contact showobject action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-01-31
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in index.php in the darko selesi estateagent (com_estateagent) 0.1 component for mambo 4.5.x and joomla! allows remote attackers to execute arbitrary sql commands via the objid parameter in a contact showobject action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-01-31\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 362
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary: in blk_mq_tag_to_rq in blk-mq.c in the upstream kernel, there is a possible use after free due to a race condition when a request has been previously freed by blk_mq_complete_request. this could lead to local escalation of privilege. product: android. versions: android kernel. android id: a-63083046.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-04-05
Last Modified Date: 2018-05-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition').",
"role": "user"
},
{
"content": "CWE Code: 362\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\nSummary: in blk_mq_tag_to_rq in blk-mq.c in the upstream kernel, there is a possible use after free due to a race condition when a request has been previously freed by blk_mq_complete_request. this could lead to local escalation of privilege. product: android. versions: android kernel. android id: a-63083046.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-04-05\nLast Modified Date: 2018-05-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.6
CWE Name: Permissions Privileges and Access Controls
Summary: an elevation of privilege vulnerability exists when the visual studio updater service improperly handles file permissions, aka 'visual studio elevation of privilege vulnerability'.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/COMPLETE/COMPLETE
Published Date: 2019-07-15
Last Modified Date: 2019-07-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: an elevation of privilege vulnerability exists when the visual studio updater service improperly handles file permissions, aka 'visual studio elevation of privilege vulnerability'.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/COMPLETE/COMPLETE\nPublished Date: 2019-07-15\nLast Modified Date: 2019-07-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the qstr method in the pdo driver in the adodb library for php before 5.x before 5.20.7 might allow remote attackers to conduct sql injection attacks via vectors related to incorrect quoting.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2016-10-03
Last Modified Date: 2017-07-01 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the qstr method in the pdo driver in the adodb library for php before 5.x before 5.20.7 might allow remote attackers to conduct sql injection attacks via vectors related to incorrect quoting.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2016-10-03\nLast Modified Date: 2017-07-01",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 4.3
CWE Name: Out-of-bounds Read
Summary: in libxaac, there is a possible out of bounds read due to a missing bounds check. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-118766492
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-27
Last Modified Date: 2019-09-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 4.3\nCWE Name: Out-of-bounds Read\nSummary: in libxaac, there is a possible out of bounds read due to a missing bounds check. this could lead to information disclosure with no additional execution privileges needed. user interaction is needed for exploitation. product: androidversions: android-10android id: a-118766492\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-09-30",
"role": "assistant"
}
] |
CWE Code: 476
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: NULL Pointer Dereference
Summary: vmware workstation (14.x before 14.1.2) and fusion (10.x before 10.1.2) contain multiple denial-of-service vulnerabilities that occur due to null pointer dereference issues in the rpc handler. successful exploitation of these issues may allow an attacker with limited privileges on the guest machine trigger a denial-of-service of their guest machine.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2018-05-22
Last Modified Date: 2018-06-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: NULL Pointer Dereference.",
"role": "user"
},
{
"content": "CWE Code: 476\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: NULL Pointer Dereference\nSummary: vmware workstation (14.x before 14.1.2) and fusion (10.x before 10.1.2) contain multiple denial-of-service vulnerabilities that occur due to null pointer dereference issues in the rpc handler. successful exploitation of these issues may allow an attacker with limited privileges on the guest machine trigger a denial-of-service of their guest machine.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2018-05-22\nLast Modified Date: 2018-06-26",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Improper Input Validation
Summary: the validate_event function in arch/arm/kernel/perf_event.c in the linux kernel before 3.10.8 on the arm platform allows local users to gain privileges or cause a denial of service (null pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-08-25
Last Modified Date: 2013-10-02 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Improper Input Validation\nSummary: the validate_event function in arch/arm/kernel/perf_event.c in the linux kernel before 3.10.8 on the arm platform allows local users to gain privileges or cause a denial of service (null pointer dereference and system crash) by adding a hardware event to an event group led by a software event.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-08-25\nLast Modified Date: 2013-10-02",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the estate agent (com_estateagent) component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a showeo action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-11-29
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the estate agent (com_estateagent) component for joomla! allows remote attackers to execute arbitrary sql commands via the id parameter in a showeo action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-29\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 276
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Incorrect Default Permissions
Summary: a vulnerability allows local attackers to escalate privilege on rapid scada 5.5.0 because of weak c:\scada permissions. the specific flaw exists within the access control that is set and modified during the installation of the product. the product sets weak access control restrictions. an attacker can leverage this vulnerability to execute arbitrary code under the context of administrator, the iusr account, or system.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-03-08
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Default Permissions.",
"role": "user"
},
{
"content": "CWE Code: 276\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Incorrect Default Permissions\nSummary: a vulnerability allows local attackers to escalate privilege on rapid scada 5.5.0 because of weak c:\\scada permissions. the specific flaw exists within the access control that is set and modified during the installation of the product. the product sets weak access control restrictions. an attacker can leverage this vulnerability to execute arbitrary code under the context of administrator, the iusr account, or system.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-03-08\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in the administrative interface in the iis extension in symantec im manager before 8.4.16 allow remote attackers to execute arbitrary sql commands via (1) the rdreport parameter to rdpageimlogic.aspx, related to the sgetdefinition function in rdserver.dll, and sql statements contained within a certain report file; (2) unspecified parameters in a detailreportgroup (aka detailreportgroup.lgx) action to rdpageimlogic.aspx; the (3) selclause, (4) wheretrendtimeclause, (5) trendtypeforreport, (6) whereprotocolclause, or (7) groupclause parameter in a summaryreportgroup (aka summaryreportgroup.lgx) action to rdpageimlogic.aspx; the (8) logintimestamp, (9) dbo, (10) datediffparam, or (11) whereclause parameter in a loggedinusers (aka loggedinusers.lgx) action to (a) rdpageimlogic.aspx or (b) rdpage.aspx; the (12) selclause, (13) wheretrendtimeclause, (14) trendtypeforreport, (15) whereprotocolclause, or (16) groupclause parameter to rdpageimlogic.aspx; (17) the grouplist parameter to imadminreporttrendformrun.asp; or (18) the email parameter to imadminschedulereport.asp.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-10-28
Last Modified Date: 2017-08-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the administrative interface in the iis extension in symantec im manager before 8.4.16 allow remote attackers to execute arbitrary sql commands via (1) the rdreport parameter to rdpageimlogic.aspx, related to the sgetdefinition function in rdserver.dll, and sql statements contained within a certain report file; (2) unspecified parameters in a detailreportgroup (aka detailreportgroup.lgx) action to rdpageimlogic.aspx; the (3) selclause, (4) wheretrendtimeclause, (5) trendtypeforreport, (6) whereprotocolclause, or (7) groupclause parameter in a summaryreportgroup (aka summaryreportgroup.lgx) action to rdpageimlogic.aspx; the (8) logintimestamp, (9) dbo, (10) datediffparam, or (11) whereclause parameter in a loggedinusers (aka loggedinusers.lgx) action to (a) rdpageimlogic.aspx or (b) rdpage.aspx; the (12) selclause, (13) wheretrendtimeclause, (14) trendtypeforreport, (15) whereprotocolclause, or (16) groupclause parameter to rdpageimlogic.aspx; (17) the grouplist parameter to imadminreporttrendformrun.asp; or (18) the email parameter to imadminschedulereport.asp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-10-28\nLast Modified Date: 2017-08-17",
"role": "assistant"
}
] |
CWE Code: 22
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary: a vulnerability in the cli of cisco aironet access points (aps) could allow an authenticated, local attacker to access sensitive information stored in an ap. the vulnerability is due to improper sanitization of user-supplied input in specific cli commands. an attacker could exploit this vulnerability by accessing the cli of an affected ap with administrator privileges and issuing crafted commands that result in directory traversal. a successful exploit could allow the attacker to view system files on the affected device, which could contain sensitive information. software versions 8.8 and 8.9 are affected.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-04-18
Last Modified Date: 2019-10-09 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal').",
"role": "user"
},
{
"content": "CWE Code: 22\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\nSummary: a vulnerability in the cli of cisco aironet access points (aps) could allow an authenticated, local attacker to access sensitive information stored in an ap. the vulnerability is due to improper sanitization of user-supplied input in specific cli commands. an attacker could exploit this vulnerability by accessing the cli of an affected ap with administrator privileges and issuing crafted commands that result in directory traversal. a successful exploit could allow the attacker to view system files on the affected device, which could contain sensitive information. software versions 8.8 and 8.9 are affected.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-04-18\nLast Modified Date: 2019-10-09",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the jobs pro component 1.6.4 for joomla! allows remote attackers to execute arbitrary sql commands via the detailed_results parameter to search_jobs.html.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-11-01
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the jobs pro component 1.6.4 for joomla! allows remote attackers to execute arbitrary sql commands via the detailed_results parameter to search_jobs.html.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-11-01\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 918
Vulnerability Type: privilege_escalation
CVSS Score: 6.5
CWE Name: Server-Side Request Forgery (SSRF)
Summary: a server-side request forgery (ssrf) vulnerability exists in magento 2.1 prior to 2.1.18, magento 2.2 prior to 2.2.9, magento 2.3 prior to 2.3.2. this can be exploited by authenticated user with admin privileges to manipulate shipment settings to execute arbitrary code.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2019-08-02
Last Modified Date: 2019-08-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Server-Side Request Forgery (SSRF).",
"role": "user"
},
{
"content": "CWE Code: 918\nVulnerability Type: privilege_escalation\nCVSS Score: 6.5\nCWE Name: Server-Side Request Forgery (SSRF)\nSummary: a server-side request forgery (ssrf) vulnerability exists in magento 2.1 prior to 2.1.18, magento 2.2 prior to 2.2.9, magento 2.3 prior to 2.3.2. this can be exploited by authenticated user with admin privileges to manipulate shipment settings to execute arbitrary code.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2019-08-02\nLast Modified Date: 2019-08-07",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Input Validation
Summary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/NONE/PARTIAL
Published Date: 2019-04-23
Last Modified Date: 2019-08-14 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Input Validation\nSummary: vulnerability in the mysql server component of oracle mysql (subcomponent: server: optimizer). supported versions that are affected are 8.0.15 and prior. easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql server. successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete dos) of mysql server. cvss 3.0 base score 4.9 (availability impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:n/i:n/a:h).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/NONE/PARTIAL\nPublished Date: 2019-04-23\nLast Modified Date: 2019-08-14",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in the call logging feature in frontrange heat 8.01 allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-10-09
Last Modified Date: 2009-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in the call logging feature in frontrange heat 8.01 allow remote attackers to execute arbitrary sql commands via the (1) username and (2) password parameters.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-10-09\nLast Modified Date: 2009-10-12",
"role": "assistant"
}
] |
CWE Code: 125
Vulnerability Type: privilege_escalation
CVSS Score: 2.1
CWE Name: Out-of-bounds Read
Summary: in bluetooth, there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-78288018
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/NONE/NONE
Published Date: 2019-09-27
Last Modified Date: 2019-10-07 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Out-of-bounds Read.",
"role": "user"
},
{
"content": "CWE Code: 125\nVulnerability Type: privilege_escalation\nCVSS Score: 2.1\nCWE Name: Out-of-bounds Read\nSummary: in bluetooth, there is a possible out of bounds read due to a missing bounds check. this could lead to local information disclosure with no additional execution privileges needed. user interaction is not needed for exploitation. product: androidversions: android-10android id: a-78288018\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/NONE/NONE\nPublished Date: 2019-09-27\nLast Modified Date: 2019-10-07",
"role": "assistant"
}
] |
CWE Code: 287
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Authentication
Summary: the local security authority subsystem service (lsass) in microsoft windows xp sp2 and sp3 and server 2003 sp2 does not properly process authentication requests, which allows local users to gain privileges via a request with a crafted length, aka "lsass length validation vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2011-02-09
Last Modified Date: 2018-10-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Authentication.",
"role": "user"
},
{
"content": "CWE Code: 287\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Authentication\nSummary: the local security authority subsystem service (lsass) in microsoft windows xp sp2 and sp3 and server 2003 sp2 does not properly process authentication requests, which allows local users to gain privileges via a request with a crafted length, aka \"lsass length validation vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2011-02-09\nLast Modified Date: 2018-10-12",
"role": "assistant"
}
] |
CWE Code: 404
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Resource Shutdown or Release
Summary: an elevation of privilege vulnerability exists when the directx graphics kernel (dxgkrnl) driver improperly handles objects in memory, aka "directx graphics kernel elevation of privilege vulnerability." this affects windows server 2016, windows 10, windows 10 servers. this cve id is unique from cve-2018-8400, cve-2018-8401, cve-2018-8405.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-08-15
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Resource Shutdown or Release.",
"role": "user"
},
{
"content": "CWE Code: 404\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Resource Shutdown or Release\nSummary: an elevation of privilege vulnerability exists when the directx graphics kernel (dxgkrnl) driver improperly handles objects in memory, aka \"directx graphics kernel elevation of privilege vulnerability.\" this affects windows server 2016, windows 10, windows 10 servers. this cve id is unique from cve-2018-8400, cve-2018-8401, cve-2018-8405.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-08-15\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: stack-based buffer overflow in oninit in ibm informix dynamic server enterprise edition 12.1 allows an authenticated user to execute predefined code with root privileges, such as escalating to a root shell. ibm x-force id: 144441.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2019-08-20
Last Modified Date: 2019-09-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: stack-based buffer overflow in oninit in ibm informix dynamic server enterprise edition 12.1 allows an authenticated user to execute predefined code with root privileges, such as escalating to a root shell. ibm x-force id: 144441.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2019-08-20\nLast Modified Date: 2019-09-03",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in album.php in camera life 2.6.2b4 allows remote attackers to execute arbitrary sql commands via the id parameter, a different vector than cve-2008-3355.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-06
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in album.php in camera life 2.6.2b4 allows remote attackers to execute arbitrary sql commands via the id parameter, a different vector than cve-2008-3355.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-06\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: unspecified vulnerability in cde dtmailpr of hp tru64 4.0f through 5.1b allows local users to gain privileges via unknown attack vectors. note: due to lack of details in the vendor advisory, it is not clear whether this is the same issue as cve-1999-0840.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2003-12-31
Last Modified Date: 2017-07-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: unspecified vulnerability in cde dtmailpr of hp tru64 4.0f through 5.1b allows local users to gain privileges via unknown attack vectors. note: due to lack of details in the vendor advisory, it is not clear whether this is the same issue as cve-1999-0840.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2003-12-31\nLast Modified Date: 2017-07-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: a vulnerability in login authentication management in cisco aironet 1800, 2800, and 3800 series access point platforms could allow an authenticated, local attacker to gain unrestricted root access to the underlying linux operating system. the root linux shell is provided for advanced troubleshooting and should not be available to individual users, even those with root privileges. the attacker must have the root password to exploit this vulnerability. more information: cscvb13893. known affected releases: 8.2(121.0) 8.3(102.0). known fixed releases: 8.4(1.53) 8.4(1.52) 8.3(111.0) 8.3(104.23) 8.2(130.0) 8.2(124.1).
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2017-04-07
Last Modified Date: 2017-07-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: a vulnerability in login authentication management in cisco aironet 1800, 2800, and 3800 series access point platforms could allow an authenticated, local attacker to gain unrestricted root access to the underlying linux operating system. the root linux shell is provided for advanced troubleshooting and should not be available to individual users, even those with root privileges. the attacker must have the root password to exploit this vulnerability. more information: cscvb13893. known affected releases: 8.2(121.0) 8.3(102.0). known fixed releases: 8.4(1.53) 8.4(1.52) 8.3(111.0) 8.3(104.23) 8.2(130.0) 8.2(124.1).\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2017-04-07\nLast Modified Date: 2017-07-12",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in calendarevent.cfm in cf_calendar allows remote attackers to execute arbitrary sql commands via the calid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-27
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in calendarevent.cfm in cf_calendar allows remote attackers to execute arbitrary sql commands via the calid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-27\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: the robust futex implementation in the linux kernel before 2.6.28 does not properly handle processes that make exec system calls, which allows local users to cause a denial of service or possibly gain privileges by writing to a memory location in a child process.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2012-06-21
Last Modified Date: 2012-06-22 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: the robust futex implementation in the linux kernel before 2.6.28 does not properly handle processes that make exec system calls, which allows local users to cause a denial of service or possibly gain privileges by writing to a memory location in a child process.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2012-06-21\nLast Modified Date: 2012-06-22",
"role": "assistant"
}
] |
CWE Code: 269
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Privilege Management
Summary: a local privilege escalation and local code execution vulnerability in fortinet fortios 5.6.0 to 5.6.2, 5.4.0 to 5.4.8, and 5.2 and below versions allows attacker to execute unauthorized binary program contained on an usb drive plugged into a fortigate via linking the aforementioned binary program to a command that is allowed to be run by the fnsysctl cli command.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-05-24
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Privilege Management.",
"role": "user"
},
{
"content": "CWE Code: 269\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Privilege Management\nSummary: a local privilege escalation and local code execution vulnerability in fortinet fortios 5.6.0 to 5.6.2, 5.4.0 to 5.4.8, and 5.2 and below versions allows attacker to execute unauthorized binary program contained on an usb drive plugged into a fortigate via linking the aforementioned binary program to a command that is allowed to be run by the fnsysctl cli command.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-05-24\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 6.9
CWE Name: Permissions Privileges and Access Controls
Summary: exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-12-14
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 6.9\nCWE Name: Permissions Privileges and Access Controls\nSummary: exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-12-14\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in default.asp in atcom netvolution 2.5.6 allows remote attackers to execute arbitrary sql commands via the artid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-10-21
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in default.asp in atcom netvolution 2.5.6 allows remote attackers to execute arbitrary sql commands via the artid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-10-21\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in pcpin chat 5.0.4 and earlier allows remote attackers to execute arbitrary sql commands via the username field (login parameter) to main.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2006-04-21
Last Modified Date: 2018-10-18 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in pcpin chat 5.0.4 and earlier allows remote attackers to execute arbitrary sql commands via the username field (login parameter) to main.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2006-04-21\nLast Modified Date: 2018-10-18",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Permissions Privileges and Access Controls
Summary: win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, and windows 7 sp1 does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "win32k information disclosure vulnerability."
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-07-10
Last Modified Date: 2019-02-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Permissions Privileges and Access Controls\nSummary: win32k.sys in the kernel-mode drivers in microsoft windows xp sp2 and sp3, windows server 2003 sp2, windows vista sp2, windows server 2008 sp2 and r2 sp1, and windows 7 sp1 does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka \"win32k information disclosure vulnerability.\"\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-07-10\nLast Modified Date: 2019-02-26",
"role": "assistant"
}
] |
CWE Code: 94
Vulnerability Type: privilege_escalation
CVSS Score: 7.6
CWE Name: Improper Control of Generation of Code ('Code Injection')
Summary: mozilla firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and seamonkey before 2.0.4, does not prevent applets from interpreting mouse clicks as drag-and-drop actions, which allows remote attackers to execute arbitrary javascript with chrome privileges by loading a chrome: url and then loading a javascript: url.
Access Authentication: NONE
Access Complexity: HIGH
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-04-05
Last Modified Date: 2018-10-30 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Control of Generation of Code ('Code Injection').",
"role": "user"
},
{
"content": "CWE Code: 94\nVulnerability Type: privilege_escalation\nCVSS Score: 7.6\nCWE Name: Improper Control of Generation of Code ('Code Injection')\nSummary: mozilla firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and seamonkey before 2.0.4, does not prevent applets from interpreting mouse clicks as drag-and-drop actions, which allows remote attackers to execute arbitrary javascript with chrome privileges by loading a chrome: url and then loading a javascript: url.\nAccess Authentication: NONE\nAccess Complexity: HIGH\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-04-05\nLast Modified Date: 2018-10-30",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: the dbus_g_proxy_manager_filter function in dbus-gproxy in dbus-glib before 0.100.1 does not properly verify the sender of nameownerchanged signals, which allows local users to gain privileges via a spoofed signal.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2013-03-05
Last Modified Date: 2017-08-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: the dbus_g_proxy_manager_filter function in dbus-gproxy in dbus-glib before 0.100.1 does not properly verify the sender of nameownerchanged signals, which allows local users to gain privileges via a spoofed signal.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2013-03-05\nLast Modified Date: 2017-08-29",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 4.0
CWE Name: Improper Access Control
Summary: cybozu garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to bypass access restriction alter the report without access privileges via the application 'multi report'.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): NONE/PARTIAL/NONE
Published Date: 2019-05-17
Last Modified Date: 2019-05-20 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 4.0\nCWE Name: Improper Access Control\nSummary: cybozu garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to bypass access restriction alter the report without access privileges via the application 'multi report'.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): NONE/PARTIAL/NONE\nPublished Date: 2019-05-17\nLast Modified Date: 2019-05-20",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 8.3
CWE Name: Improper Access Control
Summary: cisco telepresence t, telepresence te, and telepresence tc before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka bug id cscub67651.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2015-05-25
Last Modified Date: 2015-05-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 8.3\nCWE Name: Improper Access Control\nSummary: cisco telepresence t, telepresence te, and telepresence tc before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka bug id cscub67651.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2015-05-25\nLast Modified Date: 2015-05-26",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: ** disputed ** buffer overflow in sethdlc.c in the asterisk zaptel 1.4.5.1 might allow local users to gain privileges via a long device name (interface name) in the ifr_name field. note: the vendor disputes this issue, stating that the application requires root access, so privilege boundaries are not crossed.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-10-29
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: ** disputed ** buffer overflow in sethdlc.c in the asterisk zaptel 1.4.5.1 might allow local users to gain privileges via a long device name (interface name) in the ifr_name field. note: the vendor disputes this issue, stating that the application requires root access, so privilege boundaries are not crossed.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-10-29\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 119
Vulnerability Type: privilege_escalation
CVSS Score: 10.0
CWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary: a stack-based buffer overflow in flexense diskboss 8.8.16 and earlier allows unauthenticated remote attackers to execute arbitrary code in the context of a highly privileged account.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2018-01-12
Last Modified Date: 2018-01-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer.",
"role": "user"
},
{
"content": "CWE Code: 119\nVulnerability Type: privilege_escalation\nCVSS Score: 10.0\nCWE Name: Improper Restriction of Operations within the Bounds of a Memory Buffer\nSummary: a stack-based buffer overflow in flexense diskboss 8.8.16 and earlier allows unauthenticated remote attackers to execute arbitrary code in the context of a highly privileged account.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2018-01-12\nLast Modified Date: 2018-01-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in index.php in sweetrice cms before 0.6.7.1 allow remote attackers to execute arbitrary sql commands via (1) the file_name parameter in an attachment action, (2) the post parameter in a show_comment action, (3) the sys-name parameter in an rssfeed action, or (4) the sys-name parameter in a view action.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2015-01-03
Last Modified Date: 2015-01-05 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in index.php in sweetrice cms before 0.6.7.1 allow remote attackers to execute arbitrary sql commands via (1) the file_name parameter in an attachment action, (2) the post parameter in a show_comment action, (3) the sys-name parameter in an rssfeed action, or (4) the sys-name parameter in a view action.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2015-01-03\nLast Modified Date: 2015-01-05",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in tforum 2.00 in the raymond berthou script collection (aka rbl - asp) allows remote attackers to execute arbitrary sql commands via the (1) id and (2) pass to user_confirm.asp.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-01-31
Last Modified Date: 2018-10-16 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in tforum 2.00 in the raymond berthou script collection (aka rbl - asp) allows remote attackers to execute arbitrary sql commands via the (1) id and (2) pass to user_confirm.asp.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-01-31\nLast Modified Date: 2018-10-16",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 5.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in clientreport.php in the management console in symantec web gateway (swg) before 5.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-06-18
Last Modified Date: 2017-12-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in clientreport.php in the management console in symantec web gateway (swg) before 5.2 allows remote attackers to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-06-18\nLast Modified Date: 2017-12-28",
"role": "assistant"
}
] |
CWE Code: 264
Vulnerability Type: privilege_escalation
CVSS Score: 4.6
CWE Name: Permissions Privileges and Access Controls
Summary: safenet authentication service for outlook web app agent uses a weak acl for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2018-03-02
Last Modified Date: 2018-03-17 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Permissions Privileges and Access Controls.",
"role": "user"
},
{
"content": "CWE Code: 264\nVulnerability Type: privilege_escalation\nCVSS Score: 4.6\nCWE Name: Permissions Privileges and Access Controls\nSummary: safenet authentication service for outlook web app agent uses a weak acl for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2018-03-02\nLast Modified Date: 2018-03-17",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in catalog.asp in asp product catalog allows remote attackers to execute arbitrary sql commands via the cid parameter and possibly other parameters.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2007-10-05
Last Modified Date: 2018-10-15 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in catalog.asp in asp product catalog allows remote attackers to execute arbitrary sql commands via the cid parameter and possibly other parameters.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2007-10-05\nLast Modified Date: 2018-10-15",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in the ijoomla rss feeder (com_ijoomla_rss) component for joomla! allows remote attackers to execute arbitrary sql commands via the cat parameter in an xml action to index.php.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-06-17
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in the ijoomla rss feeder (com_ijoomla_rss) component for joomla! allows remote attackers to execute arbitrary sql commands via the cat parameter in an xml action to index.php.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-06-17\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.8
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: the set_magic_quotes_runtime function in php 5.3.2 and 5.3.3, when the mysqli extension is used, does not properly interact with use of the mysqli_fetch_assoc function, which might make it easier for context-dependent attackers to conduct sql injection attacks via crafted input that had been properly handled in earlier php versions.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-01-18
Last Modified Date: 2017-09-19 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.8\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: the set_magic_quotes_runtime function in php 5.3.2 and 5.3.3, when the mysqli extension is used, does not properly interact with use of the mysqli_fetch_assoc function, which might make it easier for context-dependent attackers to conduct sql injection attacks via crafted input that had been properly handled in earlier php versions.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-01-18\nLast Modified Date: 2017-09-19",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 6.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in members.php in plx auto reminder 3.7 allows remote authenticated users to execute arbitrary sql commands via the id parameter in a newar action.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2009-02-16
Last Modified Date: 2017-09-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 6.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in members.php in plx auto reminder 3.7 allows remote authenticated users to execute arbitrary sql commands via the id parameter in a newar action.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2009-02-16\nLast Modified Date: 2017-09-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 4.6
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: multiple sql injection vulnerabilities in (1) cd-mapping-db.c and (2) cd-device-db.c in colord before 0.1.15 allow local users to execute arbitrary sql commands via vectors related to color devices and (a) device id, (b) property, or (c) profile id.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2011-12-10
Last Modified Date: 2011-12-12 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 4.6\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: multiple sql injection vulnerabilities in (1) cd-mapping-db.c and (2) cd-device-db.c in colord before 0.1.15 allow local users to execute arbitrary sql commands via vectors related to color devices and (a) device id, (b) property, or (c) profile id.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2011-12-10\nLast Modified Date: 2011-12-12",
"role": "assistant"
}
] |
CWE Code: 732
Vulnerability Type: privilege_escalation
CVSS Score: 4.4
CWE Name: Incorrect Permission Assignment for Critical Resource
Summary: infotecs vipnet client and coordinator before 4.3.2-42442 allow local users to gain privileges by placing a trojan horse vipnet update file in the update folder. the attack succeeds because of incorrect folder permissions in conjunction with a lack of integrity and authenticity checks.
Access Authentication: NONE
Access Complexity: MEDIUM
Access Vector: LOCAL
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2017-06-15
Last Modified Date: 2019-10-03 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Incorrect Permission Assignment for Critical Resource.",
"role": "user"
},
{
"content": "CWE Code: 732\nVulnerability Type: privilege_escalation\nCVSS Score: 4.4\nCWE Name: Incorrect Permission Assignment for Critical Resource\nSummary: infotecs vipnet client and coordinator before 4.3.2-42442 allow local users to gain privileges by placing a trojan horse vipnet update file in the update folder. the attack succeeds because of incorrect folder permissions in conjunction with a lack of integrity and authenticity checks.\nAccess Authentication: NONE\nAccess Complexity: MEDIUM\nAccess Vector: LOCAL\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2017-06-15\nLast Modified Date: 2019-10-03",
"role": "assistant"
}
] |
CWE Code: 284
Vulnerability Type: privilege_escalation
CVSS Score: 5.5
CWE Name: Improper Access Control
Summary: vulnerability in the oracle weblogic server component of oracle fusion middleware (subcomponent: wls core components). supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. easily exploitable vulnerability allows high privileged attacker with network access via http to compromise oracle weblogic server. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle weblogic server accessible data as well as unauthorized update, insert or delete access to some of oracle weblogic server accessible data. cvss 3.0 base score 5.5 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:h/i:l/a:n).
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/NONE
Published Date: 2019-07-23
Last Modified Date: 2019-07-26 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Access Control.",
"role": "user"
},
{
"content": "CWE Code: 284\nVulnerability Type: privilege_escalation\nCVSS Score: 5.5\nCWE Name: Improper Access Control\nSummary: vulnerability in the oracle weblogic server component of oracle fusion middleware (subcomponent: wls core components). supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. easily exploitable vulnerability allows high privileged attacker with network access via http to compromise oracle weblogic server. successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all oracle weblogic server accessible data as well as unauthorized update, insert or delete access to some of oracle weblogic server accessible data. cvss 3.0 base score 5.5 (confidentiality and integrity impacts). cvss vector: (cvss:3.0/av:n/ac:l/pr:h/ui:n/s:u/c:h/i:l/a:n).\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/NONE\nPublished Date: 2019-07-23\nLast Modified Date: 2019-07-26",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in login.php in v-webmail 1.5.0 might allow remote attackers to execute arbitrary sql commands via the username parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2008-10-08
Last Modified Date: 2017-08-08 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in login.php in v-webmail 1.5.0 might allow remote attackers to execute arbitrary sql commands via the username parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2008-10-08\nLast Modified Date: 2017-08-08",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 7.5
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in customize.php in 2daybiz web template software allows remote attackers to execute arbitrary sql commands via the tid parameter.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2010-06-28
Last Modified Date: 2010-06-29 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 7.5\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in customize.php in 2daybiz web template software allows remote attackers to execute arbitrary sql commands via the tid parameter.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2010-06-28\nLast Modified Date: 2010-06-29",
"role": "assistant"
}
] |
CWE Code: 89
Vulnerability Type: sql_injection
CVSS Score: 5.2
CWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary: sql injection vulnerability in user.php in the management console in symantec web gateway (swg) before 5.2.1 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.
Access Authentication: SINGLE
Access Complexity: LOW
Access Vector: ADJACENT_NETWORK
Impact (C/I/A): PARTIAL/PARTIAL/PARTIAL
Published Date: 2014-06-18
Last Modified Date: 2017-12-28 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').",
"role": "user"
},
{
"content": "CWE Code: 89\nVulnerability Type: sql_injection\nCVSS Score: 5.2\nCWE Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nSummary: sql injection vulnerability in user.php in the management console in symantec web gateway (swg) before 5.2.1 allows remote authenticated users to execute arbitrary sql commands via unspecified vectors.\nAccess Authentication: SINGLE\nAccess Complexity: LOW\nAccess Vector: ADJACENT_NETWORK\nImpact (C/I/A): PARTIAL/PARTIAL/PARTIAL\nPublished Date: 2014-06-18\nLast Modified Date: 2017-12-28",
"role": "assistant"
}
] |
CWE Code: 20
Vulnerability Type: privilege_escalation
CVSS Score: 7.2
CWE Name: Improper Input Validation
Summary: the vmware tools update functionality in vmware workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548; vmware player 2.5.x before 2.5.5 build 328052 and 3.1.x before 3.1.2 build 301548; vmware server 2.0.2; vmware fusion 2.x before 2.0.8 build 328035 and 3.1.x before 3.1.2 build 332101; vmware esxi 3.5, 4.0, and 4.1; and vmware esx 3.0.3, 3.5, 4.0, and 4.1 allows host os users to gain privileges on the guest os via unspecified vectors, related to a "command injection" issue.
Access Authentication: NONE
Access Complexity: LOW
Access Vector: LOCAL
Impact (C/I/A): COMPLETE/COMPLETE/COMPLETE
Published Date: 2010-12-06
Last Modified Date: 2018-10-10 | [
{
"content": "You are a cybersecurity expert assistant. Provide detailed information about vulnerabilities in a clear and structured format.",
"role": "system"
},
{
"content": "Please provide details about this vulnerability: Improper Input Validation.",
"role": "user"
},
{
"content": "CWE Code: 20\nVulnerability Type: privilege_escalation\nCVSS Score: 7.2\nCWE Name: Improper Input Validation\nSummary: the vmware tools update functionality in vmware workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548; vmware player 2.5.x before 2.5.5 build 328052 and 3.1.x before 3.1.2 build 301548; vmware server 2.0.2; vmware fusion 2.x before 2.0.8 build 328035 and 3.1.x before 3.1.2 build 332101; vmware esxi 3.5, 4.0, and 4.1; and vmware esx 3.0.3, 3.5, 4.0, and 4.1 allows host os users to gain privileges on the guest os via unspecified vectors, related to a \"command injection\" issue.\nAccess Authentication: NONE\nAccess Complexity: LOW\nAccess Vector: LOCAL\nImpact (C/I/A): COMPLETE/COMPLETE/COMPLETE\nPublished Date: 2010-12-06\nLast Modified Date: 2018-10-10",
"role": "assistant"
}
] |
End of preview. Expand
in Dataset Viewer.
Dataset Card for Dataset Name
This dataset card aims to be a base template for new datasets. It has been generated using this raw template.
Dataset Details
Dataset Description
- Curated by: [More Information Needed]
- Funded by [optional]: [More Information Needed]
- Shared by [optional]: [More Information Needed]
- Language(s) (NLP): [More Information Needed]
- License: [More Information Needed]
Dataset Sources [optional]
- Repository: [More Information Needed]
- Paper [optional]: [More Information Needed]
- Demo [optional]: [More Information Needed]
Uses
Direct Use
[More Information Needed]
Out-of-Scope Use
[More Information Needed]
Dataset Structure
[More Information Needed]
Dataset Creation
Curation Rationale
[More Information Needed]
Source Data
Data Collection and Processing
[More Information Needed]
Who are the source data producers?
[More Information Needed]
Annotations [optional]
Annotation process
[More Information Needed]
Who are the annotators?
[More Information Needed]
Personal and Sensitive Information
[More Information Needed]
Bias, Risks, and Limitations
[More Information Needed]
Recommendations
Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.
Citation [optional]
BibTeX:
[More Information Needed]
APA:
[More Information Needed]
Glossary [optional]
[More Information Needed]
More Information [optional]
[More Information Needed]
Dataset Card Authors [optional]
[More Information Needed]
Dataset Card Contact
[More Information Needed]
- Downloads last month
- 38