{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T08:48:21.914","vulnerabilities":[{"cve":{"id":"CVE-2018-5404","sourceIdentifier":"cret@cert.org","published":"2019-06-03T19:29:01.593","lastModified":"2024-11-21T04:08:45.120","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Quest Kace K1000 Appliance, versions prior to 9.0.270, allows an authenticated, remote attacker with least privileges ('User Console Only' role) to potentially exploit multiple Blind SQL Injection vulnerabilities to retrieve sensitive information from the database or copy the entire database. An authenticated remote attacker could leverage Blind SQL injections to obtain sensitive data."},{"lang":"es","value":"El dispositivo Quest Kace K1000, versiones anteriores a 9.0.270, permite a un atacante remoto autenticado con los privilegios mínimos (función 'Solo consola de usuario') explotar varias vulnerabilidades de Inyección SQL ciega para recuperar información confidencial de la base de datos o copiar la base de datos completa. Un atacante remoto autenticado podría aprovechar las inyecciones SQL ciegas para obtener datos confidenciales."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cret@cert.org","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:quest:kace_systems_management_appliance_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.0.270","matchCriteriaId":"24B925CF-12DB-4729-8FD9-5CA8872B6679"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:quest:kace_systems_management_appliance:-:*:*:*:*:*:*:*","matchCriteriaId":"15602132-D4C9-466E-9973-CDE289F23363"}]}]}],"references":[{"url":"https://support.quest.com/kb/288310/cert-coordination-center-report-update","source":"cret@cert.org","tags":["Vendor Advisory"]},{"url":"https://www.kb.cert.org/vuls/id/877837/","source":"cret@cert.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://support.quest.com/kb/288310/cert-coordination-center-report-update","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.kb.cert.org/vuls/id/877837/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}