Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2014-0349

Publication date:
12/04/2014
Multiple unspecified vulnerabilities in J2k-Codec allow remote attackers to execute arbitrary code via a crafted JPEG 2000 file.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2014-0773

Publication date:
12/04/2014
The BWOCXRUN.BwocxrunCtrl.1 control contains a method named <br /> “CreateProcess.” This method contains validation to ensure an attacker <br /> cannot run arbitrary command lines. After validation, the values <br /> supplied in the HTML are passed to the Windows CreateProcessA API.<br /> <br /> <br /> The validation can be bypassed allowing for running arbitrary command<br /> lines. The command line can specify running remote files (example: UNC <br /> command line).<br /> <br /> <br /> A function exists at offset 100019B0 of bwocxrun.ocx. Inside this <br /> function, there are 3 calls to strstr to check the contents of the user <br /> specified command line. If “\setup.exe,” “\bwvbprt.exe,” or <br /> “\bwvbprtl.exe” are contained in the command line (strstr returns <br /> nonzero value), the command line passes validation and is then passed to<br /> CreateProcessA.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2014-2139

Publication date:
12/04/2014
Cisco ONS 15454 controller cards with software 9.6 and earlier allow remote attackers to cause a denial of service (flash write outage) via a TCP FIN attack that triggers file-descriptor exhaustion, aka Bug ID CSCug97315.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2014-2140

Publication date:
12/04/2014
Cisco ONS 15454 controller cards with software 9.6 and earlier allow remote attackers to cause a denial of service (card reset) via a TCP FIN attack that triggers file-descriptor exhaustion and a failure to open a CAL pipe, aka Bug ID CSCug97348.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2014-2142

Publication date:
12/04/2014
Cisco ONS 15454 controller cards with software 10.0 and earlier allow remote attackers to cause a denial of service (card reload) via a crafted HTTP URI, aka Bug ID CSCun06870.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2014-2389

Publication date:
12/04/2014
Stack-based buffer overflow in a certain decryption function in qconnDoor on BlackBerry Z10 devices with software 10.1.0.2312, when developer-mode has been previously enabled, allows remote attackers to execute arbitrary code via a crafted packet in a TCP session on a wireless network.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2013-6216

Publication date:
12/04/2014
Unspecified vulnerability in HP Array Configuration Utility, Array Diagnostics Utility, ProLiant Array Diagnostics, and SmartSSD Wear Gauge Utility 9.40 and earlier allows local users to gain privileges via unknown vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2014-0763

Publication date:
12/04/2014
An attacker using SQL injection may use arguments to construct queries <br /> without proper sanitization. The DBVisitor.dll is exposed through SOAP <br /> interfaces, and the exposed functions are vulnerable to SOAP injection. <br /> This may allow unexpected SQL action and access to records in the table <br /> of the software database or execution of arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2014-0764

Publication date:
12/04/2014
By providing an overly long string to the NodeName parameter, an <br /> attacker may be able to overflow the static stack buffer. The attacker <br /> may then execute code on the target device remotely.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2014-0765

Publication date:
12/04/2014
To exploit this vulnerability, the attacker sends data from the GotoCmd <br /> argument to control. If the value of the argument is overly long, the <br /> static stack buffer can be overflowed. This will allow the attacker to <br /> execute arbitrary code remotely.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2014-0766

Publication date:
12/04/2014
An attacker can exploit this vulnerability by copying an overly long <br /> NodeName2 argument into a statically sized buffer on the stack to <br /> overflow the static stack buffer. An attacker may use this vulnerability<br /> to remotely execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2014-0767

Publication date:
12/04/2014
An attacker may exploit this vulnerability by passing an overly long <br /> value from the AccessCode argument to the control. This will overflow <br /> the static stack buffer. The attacker may then execute code on the <br /> target device remotely.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025