Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-19019

Publication date:
02/12/2019
An issue was discovered in TitanHQ WebTitan before 5.18. It contains a Remote Code Execution issue through which an attacker can execute arbitrary code as root. The issue stems from the hotfix download mechanism, which downloads a shell script via HTTP, and then executes it as root. This is analogous to CVE-2019-6800 but for a different product.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19021

Publication date:
02/12/2019
An issue was discovered in TitanHQ WebTitan before 5.18. It has a hidden support account (with a hard-coded password) in the web administration interface, with administrator privileges. Anybody can log in with this account.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2019

CVE-2019-19020

Publication date:
02/12/2019
An issue was discovered in TitanHQ WebTitan before 5.18. In the administration web interface it is possible to upload a crafted backup file that enables an attacker to execute arbitrary code by overwriting existing files or adding new PHP files under the web root. This requires the attacker to have access to a valid web interface account.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2019

CVE-2019-19507

Publication date:
02/12/2019
In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
Severity CVSS v4.0: Pending analysis
Last modification:
19/12/2019

CVE-2019-12518

Publication date:
02/12/2019
Anviz CrossChex access control management software 4.3.8.0 and 4.3.12 is vulnerable to a buffer overflow vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2020

CVE-2019-19018

Publication date:
02/12/2019
An issue was discovered in TitanHQ WebTitan before 5.18. It exposes a database configuration file under /include/dbconfig.ini in the web administration interface, revealing what database the web application is using.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-12503

Publication date:
02/12/2019
Due to unencrypted and unauthenticated data communication, the wireless barcode scanner Inateck BCST-60 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-12394

Publication date:
02/12/2019
Anviz access control devices allow unverified password change which allows remote attackers to change the administrator password without prior authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2019

CVE-2019-19016

Publication date:
02/12/2019
An issue was discovered in TitanHQ WebTitan before 5.18. Some functions, such as /history-x.php, of the administration interface are vulnerable to SQL Injection through the results parameter. This could be used by an attacker to extract sensitive information from the appliance database.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2019

CVE-2019-19014

Publication date:
02/12/2019
An issue was discovered in TitanHQ WebTitan before 5.18. It has a sudoers file that enables low-privilege users to execute a vast number of commands as root, including mv, chown, and chmod. This can be trivially exploited to gain root privileges by an attacker with access.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2019

CVE-2019-19015

Publication date:
02/12/2019
An issue was discovered in TitanHQ WebTitan before 5.18. The proxy service (which is typically exposed to all users) allows connections to the internal PostgreSQL database of the appliance. By connecting to the database through the proxy (without password authentication), an attacker is able to fully control the appliance database. Through this, several different paths exist to gain further access, or execute code.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2019

CVE-2019-19017

Publication date:
02/12/2019
An issue was discovered in TitanHQ WebTitan before 5.18. The appliance has a hard-coded root password set during installation. An attacker could utilize this to gain root privileges on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2019