Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2015-7890

Publication date:
12/02/2020
Multiple buffer overflows in the esa_write function in /dev/seirenin the Exynos Seiren Audio driver, as used in Samsung S6 Edge, allow local users to cause a denial of service (memory corruption) via a large (1) buffer or (2) size parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2020

CVE-2015-5617

Publication date:
12/02/2020
SQL injection vulnerability in pub/m_pending_news/delete_pending_news.jsp in Enorth Webpublisher CMS allows remote attackers to execute arbitrary SQL commands via the cbNewsId parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2020

CVE-2013-7381

Publication date:
12/02/2020
libnotify before 1.0.4 for Node.js allows remote attackers to execute arbitrary commands via unspecified characters in a call to libnotify.notify.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2020

CVE-2013-2010

Publication date:
12/02/2020
WordPress W3 Total Cache Plugin 0.9.2.8 has a Remote PHP Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2020

CVE-2013-1410

Publication date:
12/02/2020
Perforce P4web 2011.1 and 2012.1 has multiple XSS vulnerabilities
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2020

CVE-2019-20098

Publication date:
12/02/2020
The VerifySmtpServerConnection!add.jspa component in Atlassian Jira Server and Data Center before version 8.7.0 is vulnerable to cross-site request forgery (CSRF). An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2022

CVE-2019-20099

Publication date:
12/02/2020
The VerifyPopServerConnection!add.jspa component in Atlassian Jira Server and Data Center before version 8.7.0 is vulnerable to cross-site request forgery (CSRF). An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2022

CVE-2019-20100

Publication date:
12/02/2020
The Atlassian Application Links plugin is vulnerable to cross-site request forgery (CSRF). The following versions are affected: all versions prior to 5.4.21, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.2, and from version 7.1.0 before version 7.1.3. The vulnerable plugin is used by Atlassian Jira Server and Data Center before version 8.7.0. An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2022

CVE-2012-0810

Publication date:
12/02/2020
The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2009-5140

Publication date:
12/02/2020
The SIP implementation on the Linksys SPA2102 phone adapter provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2013-7378

Publication date:
12/02/2020
scripts/email.coffee in the Hubot Scripts module before 2.4.4 for Node.js allows remote attackers to execute arbitrary commands.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2020

CVE-2009-5139

Publication date:
12/02/2020
The SIP implementation on the Gizmo5 software phone provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024