Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-7692

Publication date:
10/02/2019
install/install.php in CIM 0.9.3 allows remote attackers to execute arbitrary PHP code via a crafted prefix value because of configuration file mishandling in the N=83 case, as demonstrated by a call to the PHP fputs function that creates a .php file in the public folder.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-13792

Publication date:
10/02/2019
Multiple SQL injection vulnerabilities in the monitoring feature in the HTTP API in ABBYY FlexiCapture before 12 Release 2 allow an attacker to execute arbitrary SQL commands via the mask, sortOrder, filter, or Order parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2020

CVE-2019-7684

Publication date:
09/02/2019
inxedu through 2018-12-24 has a vulnerability that can lead to the upload of a malicious JSP file. The vulnerable code location is com.inxedu.os.common.controller.VideoUploadController#gok4 (com/inxedu/os/common/controller/VideoUploadController.java). The attacker uses the /video/uploadvideo fileType parameter to change the list of acceptable extensions from jpg,gif,png,jpeg to jpg,gif,png,jsp,jpeg.
Severity CVSS v4.0: Pending analysis
Last modification:
22/02/2019

CVE-2009-5154

Publication date:
09/02/2019
An issue was discovered on MOBOTIX S14 MX-V4.2.1.61 devices. There is a default password of meinsm for the admin account.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2019-7677

Publication date:
09/02/2019
XSS exists in Enphase Envoy R3.*.* via the profileName parameter to the /home URI on TCP port 8888.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2019

CVE-2019-7678

Publication date:
09/02/2019
A directory traversal vulnerability was discovered in Enphase Envoy R3.*.* via images/, include/, include/js, or include/css on TCP port 8888.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2019

CVE-2019-7674

Publication date:
09/02/2019
An issue was discovered on MOBOTIX S14 MX-V4.2.1.61 devices. /admin/access accepts a request to set the "aaaaa" password, considered insecure for some use cases, from a user.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-7675

Publication date:
09/02/2019
An issue was discovered on MOBOTIX S14 MX-V4.2.1.61 devices. The default management application is delivered over cleartext HTTP with Basic Authentication, as demonstrated by the /admin/index.html URI.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-7676

Publication date:
09/02/2019
A weak password vulnerability was discovered in Enphase Envoy R3.*.*. One can login via TCP port 8888 with the admin password for the admin account.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-7673

Publication date:
09/02/2019
An issue was discovered on MOBOTIX S14 MX-V4.2.1.61 devices. Administrator Credentials are stored in the 13-character DES hash format.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-7662

Publication date:
09/02/2019
An assertion failure was discovered in wasm::WasmBinaryBuilder::getType() in wasm-binary.cpp in Binaryen 1.38.22. This allows remote attackers to cause a denial of service (failed assertion and crash) via a crafted wasm file.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2020

CVE-2019-7663

Publication date:
09/02/2019
An Invalid Address dereference was discovered in TIFFWriteDirectoryTagTransferfunction in libtiff/tif_dirwrite.c in LibTIFF 4.0.10, affecting the cpSeparateBufToContigBuf function in tiffcp.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted tiff file. This is different from CVE-2018-12900.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020