Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-19509

Publication date:
21/03/2019
wg7.php in Webgalamb 7.0 makes opportunistic calls to htmlspecialchars() instead of using a templating engine with proper contextual encoding. Because it is possible to insert arbitrary strings into the database, any JavaScript could be executed by the administrator, leading to XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2019

CVE-2018-19510

Publication date:
21/03/2019
subscriber.php in Webgalamb through 7.0 is vulnerable to SQL injection via the Client-IP HTTP request header.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2019

CVE-2018-19514

Publication date:
21/03/2019
In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a malicious payload that becomes part of a PHP eval() expression in the subscriber.php file.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2019

CVE-2018-19512

Publication date:
21/03/2019
In Webgalamb through 7.0, a system/ajax.php "wgmfile restore" directory traversal vulnerability could lead to arbitrary code execution by authenticated administrator users, because PHP files are restored under the document root directory.
Severity CVSS v4.0: Pending analysis
Last modification:
22/03/2019

CVE-2018-19513

Publication date:
21/03/2019
In Webgalamb through 7.0, log files are exposed to the internet with predictable files/logs/sql_error_log/YYYY-MM-DD-sql_error_log.log filenames. The log file could contain sensitive client data (email addresses) and also facilitates exploitation of SQL injection errors.
Severity CVSS v4.0: Pending analysis
Last modification:
22/03/2019

CVE-2018-19498

Publication date:
21/03/2019
The Simplenia Pages plugin 2.6.0 for Atlassian Bitbucket Server has XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2019

CVE-2018-19524

Publication date:
21/03/2019
An issue was discovered on Shenzhen Skyworth DT741 Converged Intelligent Terminal (G/EPON+IPTV) SDOTBGN1, DT721-cb SDOTBGN1, and DT741-cb SDOTBGN1 devices. A long password to the Web_passwd function allows remote attackers to cause a denial of service (segmentation fault) or achieve unauthenticated remote code execution because of control of registers S0 through S4 and T4 through T7.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2019

CVE-2018-19515

Publication date:
21/03/2019
In Webgalamb through 7.0, system/ajax.php functionality is supposed to be available only to the administrator. However, by using one of the bgsend, atment_sddd1xGz, or xls_bgimport query parameters, most of these methods become available to unauthenticated users.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-19511

Publication date:
21/03/2019
wg7.php in Webgalamb 7.0 lacks security measures to prevent CSRF attacks, as demonstrated by wg7.php?options=1 to change the administrator password.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-19525

Publication date:
21/03/2019
An issue was discovered on Systrome ISG-600C, ISG-600H, and ISG-800W 1.1-R2.1_TRUNK-20180914.bin devices. There is CSRF via /ui/?g=obj_keywords_add and /ui/?g=obj_keywords_addsave with resultant XSS because of a lack of csrf token validation.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-19191

Publication date:
21/03/2019
Webmin 1.890 has XSS via /config.cgi?webmin, the /shell/index.cgi history parameter, /shell/index.cgi?stripped=1, or the /webminlog/search.cgi uall or mall parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2019

CVE-2018-19276

Publication date:
21/03/2019
OpenMRS before 2.24.0 is affected by an Insecure Object Deserialization vulnerability that allows an unauthenticated user to execute arbitrary commands on the targeted system via crafted XML data in a request body.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2023