Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-6315

Publication date:
25/01/2018
The outputSWF_TEXT_RECORD function (util/outputscript.c) in libming through 0.4.8 is vulnerable to an integer overflow and resultant out-of-bounds read, which may allow attackers to cause a denial of service or unspecified other impact via a crafted SWF file.
Severity CVSS v4.0: Pending analysis
Last modification:
26/04/2019

CVE-2018-5447

Publication date:
25/01/2018
An Improper Input Validation issue was discovered in Nari PCS-9611 relay. An improper input validation vulnerability has been identified that affects a service within the software that may allow a remote attacker to arbitrarily read/access system resources and affect the availability of the system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2017-15703

Publication date:
25/01/2018
Any authenticated user (valid client certificate but without ACL permissions) could upload a template which contained malicious code and caused a denial of service via Java deserialization attack. The fix to properly handle Java deserialization was applied on the Apache NiFi 1.4.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2018

CVE-2017-15132

Publication date:
25/01/2018
A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-1051

Publication date:
25/01/2018
It was found that the fix for CVE-2016-9606 in versions 3.0.22 and 3.1.2 was incomplete and Yaml unmarshalling in Resteasy is still possible via `Yaml.load()` in YamlProvider.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2017-1000505

Publication date:
25/01/2018
In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2018

CVE-2018-5973

Publication date:
25/01/2018
SQL Injection exists in Professional Local Directory Script 1.0 via the sellers_subcategories.php IndustryID parameter, or the suppliers.php IndustryID or CategoryID parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2018

CVE-2018-5997

Publication date:
25/01/2018
An issue was discovered in the HTTP Server in RAVPower Filehub 2.000.056. Due to an unrestricted upload feature and a path traversal vulnerability, it is possible to upload a file on a filesystem with root privileges: this will lead to remote code execution as root.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2018

CVE-2018-5964

Publication date:
25/01/2018
CMS Made Simple (CMSMS) 2.2.5 has XSS in admin/moduleinterface.php via the m1_messages parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2018

CVE-2018-5963

Publication date:
25/01/2018
CMS Made Simple (CMSMS) 2.2.5 has XSS in admin/addbookmark.php via the title parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2018

CVE-2018-5965

Publication date:
25/01/2018
CMS Made Simple (CMSMS) 2.2.5 has XSS in admin/moduleinterface.php via the m1_errors parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2018

CVE-2017-1000414

Publication date:
25/01/2018
ImpulseAdventure JPEGsnoop version 1.7.5 is vulnerable to a division by zero in the JFIF decode handling resulting denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
08/02/2018