Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2013-0928

Publication date:
21/01/2013
The NetWorker command processor in rrobotd.exe in the Device Manager in EMC AlphaStor 4.0 before build 800 allows remote attackers to execute arbitrary commands via a DCP "run command" operation.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2013-0929

Publication date:
21/01/2013
Format string vulnerability in the _vsnsprintf function in rrobotd.exe in the Device Manager in EMC AlphaStor 4.0 before build 800 allows remote attackers to execute arbitrary code via format string specifiers in a command.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2013-0656

Publication date:
21/01/2013
Buffer overflow in a third-party ActiveX component in Siemens SIMATIC RF-MANAGER 2008, and RF-MANAGER Basic 3.0 and earlier, allows remote attackers to execute arbitrary code via a crafted web site.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2013-1108

Publication date:
21/01/2013
Cisco WebEx Training Center allows remote authenticated users to remove hands-on lab-session reservations via a crafted URL, aka Bug ID CSCzu81064.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2013-1110

Publication date:
21/01/2013
Cisco WebEx Training Center allow remote authenticated users to bypass intended privilege restrictions and (1) enable or (2) disable training-center recordings via a crafted URL, aka Bug ID CSCzu81065.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-6068

Publication date:
21/01/2013
The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2025

CVE-2012-6069

Publication date:
21/01/2013
The CoDeSys Runtime Toolkit’s file transfer functionality does not <br /> perform input validation, which allows an attacker to access files and <br /> directories outside the intended scope. This may allow an attacker to <br /> upload and download any file on the device. This could allow the <br /> attacker to affect the availability, integrity, and confidentiality of <br /> the device.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2025

CVE-2012-2291

Publication date:
21/01/2013
EMC Avamar Client 4.x, 5.x, and 6.x on HP-UX and Mac OS X, and the EMC Avamar plugin 4.x, 5.x, and 6.x for Oracle, uses world-writable permissions for cache directories, which allows local users to gain privileges via an unspecified symlink attack.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2013-0655

Publication date:
21/01/2013
The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2013-0657

Publication date:
21/01/2013
Stack-based buffer overflow in Schneider Electric Interactive Graphical SCADA System (IGSS) 10 and earlier allows remote attackers to execute arbitrary code by sending TCP port-12397 data that does not comply with a protocol.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-6113

Publication date:
19/01/2013
The openssl_encrypt function in ext/openssl/openssl.c in PHP 5.3.9 through 5.3.13 does not initialize a certain variable, which allows remote attackers to obtain sensitive information from process memory by providing zero bytes of input data.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-6396

Publication date:
19/01/2013
Cisco NX-OS on Nexus 7000 series switches does not properly handle certain line-card replacements, which might allow remote authenticated users to cause a denial of service (memory consumption) via a crafted configuration that references interfaces that do not exist on the new card, aka Bug ID CSCud44300.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025