Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-19917

Publication date:
21/03/2019
Microweber 1.0.8 has reflected cross-site scripting (XSS) vulnerabilities.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2019

CVE-2018-19985

Publication date:
21/03/2019
The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
Severity CVSS v4.0: Pending analysis
Last modification:
03/09/2019

CVE-2018-1992

Publication date:
21/03/2019
The IBM Power 9 OP910, OP920, and FW910 boot firmware's bootloader is responsible for loading and validating the initial boot firmware image that drives the rest of the system's hardware initialization. The bootloader firmware contains a buffer overflow vulnerability such that, if an attacker were able to replace the initial boot firmware image with a very carefully crafted and sufficiently large, malicious replacement, it could cause the bootloader, during the load of that image, to overwrite its own instruction memory and circumvent secure boot protections, install trojans, etc. IBM X-Force ID: 154345.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-19694

Publication date:
21/03/2019
HMS Industrial Networks Netbiter WS100 3.30.5 devices and previous have reflected XSS in the login form.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2019

CVE-2018-19783

Publication date:
21/03/2019
Kentix MultiSensor-LAN 5.63.00 devices and previous allow Authentication Bypass via an Alternate Path or Channel.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2019

CVE-2018-19872

Publication date:
21/03/2019
An issue was discovered in Qt 5.11. A malformed PPM image causes a division by zero and a crash in qppmhandler.cpp.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-19487

Publication date:
21/03/2019
The WP-jobhunt plugin before version 2.4 for WordPress does not control AJAX requests sent to the cs_employer_ajax_profile() function through the admin-ajax.php file, which allows remote unauthenticated attackers to enumerate information about users.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2019

CVE-2018-19488

Publication date:
21/03/2019
The WP-jobhunt plugin before version 2.4 for WordPress does not control AJAX requests sent to the cs_reset_pass() function through the admin-ajax.php file, which allows remote unauthenticated attackers to reset the password of a user's account.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2019

CVE-2018-19509

Publication date:
21/03/2019
wg7.php in Webgalamb 7.0 makes opportunistic calls to htmlspecialchars() instead of using a templating engine with proper contextual encoding. Because it is possible to insert arbitrary strings into the database, any JavaScript could be executed by the administrator, leading to XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2019

CVE-2018-19510

Publication date:
21/03/2019
subscriber.php in Webgalamb through 7.0 is vulnerable to SQL injection via the Client-IP HTTP request header.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2019

CVE-2018-19514

Publication date:
21/03/2019
In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a malicious payload that becomes part of a PHP eval() expression in the subscriber.php file.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2019

CVE-2018-19512

Publication date:
21/03/2019
In Webgalamb through 7.0, a system/ajax.php "wgmfile restore" directory traversal vulnerability could lead to arbitrary code execution by authenticated administrator users, because PHP files are restored under the document root directory.
Severity CVSS v4.0: Pending analysis
Last modification:
22/03/2019