Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2016-10528

Publication date:
31/05/2018
restafary is a REpresentful State Transfer API for Creating, Reading, Using, Deleting files on a server from the web. Restafary before 1.6.1 is able to set up a root path, which should only allow it to run inside of that root path it specified.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10529

Publication date:
31/05/2018
Droppy versions
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-10530

Publication date:
31/05/2018
The airbrake module 0.3.8 and earlier defaults to sending environment variables over HTTP. Environment variables can often times contain secret keys and other sensitive values. A malicious user could be on the same network as a regular user and intercept all the secret keys the user is sending. This goes against common best practice, which is to use HTTPS.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2014-10064

Publication date:
31/05/2018
The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2014-10065

Publication date:
31/05/2018
Certain input when passed into remarkable before 1.4.1 will bypass the bad protocol check that disallows the javascript: scheme allowing for javascript: url's to be injected into the rendered content.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-11627

Publication date:
31/05/2018
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2019

CVE-2018-11136

Publication date:
31/05/2018
The 'orgID' parameter received by the '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is not sanitized, leading to SQL injection (in particular, a blind time-based type).
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2018

CVE-2018-11134

Publication date:
31/05/2018
In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2018

CVE-2018-11141

Publication date:
31/05/2018
The 'IMAGES_JSON' and 'attachments_to_remove[]' parameters of the '/adminui/advisory.php' script in the Quest KACE System Management Virtual Appliance 8.0.318 can be abused to write and delete files respectively via Directory Traversal. Files can be at any location where the 'www' user has write permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2018

CVE-2018-11140

Publication date:
31/05/2018
The 'reportID' parameter received by the '/common/run_report.php' script in the Quest KACE System Management Appliance 8.0.318 is not sanitized, leading to SQL injection (in particular, an error-based type).
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2018

CVE-2018-11137

Publication date:
31/05/2018
The 'checksum' parameter of the '/common/download_attachment.php' script in the Quest KACE System Management Appliance 8.0.318 can be abused to read arbitrary files with 'www' privileges via Directory Traversal. No administrator privileges are needed to execute this script.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2018

CVE-2018-11133

Publication date:
31/05/2018
The 'fmt' parameter of the '/common/run_cross_report.php' script in the the Quest KACE System Management Appliance 8.0.318 is vulnerable to cross-site scripting.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2018