Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2016-10541

Publication date:
31/05/2018
The npm module "shell-quote" 1.6.0 and earlier cannot correctly escape ">" and "
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2023

CVE-2016-10542

Publication date:
31/05/2018
ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10543

Publication date:
31/05/2018
call is an HTTP router that is primarily used by the hapi framework. There exists a bug in call versions 2.0.1-3.0.1 that does not validate empty parameters, which could result in invalid input bypassing the route validation rules.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10544

Publication date:
31/05/2018
uws is a WebSocket server library. By sending a 256mb websocket message to a uws server instance with permessage-deflate enabled, there is a possibility used compression will shrink said 256mb down to less than 16mb of websocket payload which passes the length check of 16mb payload. This data will then inflate up to 256mb and crash the node process by exceeding V8's maximum string size. This affects uws >=0.10.0
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10546

Publication date:
31/05/2018
An arbitrary code injection vector was found in PouchDB 6.0.4 and lesser via the map/reduce functions used in PouchDB temporary views and design documents. The code execution engine for this branch is not properly sandboxed and may be used to run arbitrary JavaScript as well as system commands.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10547

Publication date:
31/05/2018
Nunjucks is a full featured templating engine for JavaScript. Versions 2.4.2 and lower have a cross site scripting (XSS) vulnerability in autoescape mode. In autoescape mode, all template vars should automatically be escaped. By using an array for the keys, such as `name[]=alert(1)`, it is possible to bypass autoescaping and inject content into the DOM.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10548

Publication date:
31/05/2018
Arbitrary code execution is possible in reduce-css-calc node module
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10549

Publication date:
31/05/2018
Sails is an MVC style framework for building realtime web applications. Version 0.12.7 and lower have an issue with the CORS configuration where the value of the origin header is reflected as the value for the Access-Control-Allow-Origin header. This would allow an attacker to make AJAX requests to vulnerable hosts through cross site scripting or a malicious HTML Document, effectively bypassing the Same Origin Policy. Note that this is only an issue when `allRoutes` is set to `true` and `origin` is set to `*` or left commented out in the sails CORS config file. The problem can be compounded when the cors `credentials` setting is not provided. At that point authenticated cross domain requests are possible.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10550

Publication date:
31/05/2018
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS If user input goes into the `limit` or `order` parameters, a malicious user can put in their own SQL statements. This affects sequelize 3.16.0 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10552

Publication date:
31/05/2018
igniteui 0.0.5 and earlier downloads JavaScript and CSS resources over insecure protocol.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10553

Publication date:
31/05/2018
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS. A fix was pushed out that fixed potential SQL injection in sequelize 2.1.3 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10523

Publication date:
31/05/2018
MQTT before 3.4.6 and 4.0.x before 4.0.5 allows specifically crafted MQTT packets to crash the application, making a DoS attack feasible with very little bandwidth.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019