Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2014-2142

Publication date:
12/04/2014
Cisco ONS 15454 controller cards with software 10.0 and earlier allow remote attackers to cause a denial of service (card reload) via a crafted HTTP URI, aka Bug ID CSCun06870.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2014-2389

Publication date:
12/04/2014
Stack-based buffer overflow in a certain decryption function in qconnDoor on BlackBerry Z10 devices with software 10.1.0.2312, when developer-mode has been previously enabled, allows remote attackers to execute arbitrary code via a crafted packet in a TCP session on a wireless network.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2013-6216

Publication date:
12/04/2014
Unspecified vulnerability in HP Array Configuration Utility, Array Diagnostics Utility, ProLiant Array Diagnostics, and SmartSSD Wear Gauge Utility 9.40 and earlier allows local users to gain privileges via unknown vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2014-0763

Publication date:
12/04/2014
An attacker using SQL injection may use arguments to construct queries <br /> without proper sanitization. The DBVisitor.dll is exposed through SOAP <br /> interfaces, and the exposed functions are vulnerable to SOAP injection. <br /> This may allow unexpected SQL action and access to records in the table <br /> of the software database or execution of arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2014-0764

Publication date:
12/04/2014
By providing an overly long string to the NodeName parameter, an <br /> attacker may be able to overflow the static stack buffer. The attacker <br /> may then execute code on the target device remotely.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2014-0765

Publication date:
12/04/2014
To exploit this vulnerability, the attacker sends data from the GotoCmd <br /> argument to control. If the value of the argument is overly long, the <br /> static stack buffer can be overflowed. This will allow the attacker to <br /> execute arbitrary code remotely.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2014-0766

Publication date:
12/04/2014
An attacker can exploit this vulnerability by copying an overly long <br /> NodeName2 argument into a statically sized buffer on the stack to <br /> overflow the static stack buffer. An attacker may use this vulnerability<br /> to remotely execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2014-0767

Publication date:
12/04/2014
An attacker may exploit this vulnerability by passing an overly long <br /> value from the AccessCode argument to the control. This will overflow <br /> the static stack buffer. The attacker may then execute code on the <br /> target device remotely.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2014-0768

Publication date:
12/04/2014
An attacker may pass an overly long value from the AccessCode2 argument <br /> to the control to overflow the static stack buffer. The attacker may <br /> then remotely execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2014-0787

Publication date:
12/04/2014
Stack-based buffer overflow in WellinTech KingSCADA before 3.1.2.13 allows remote attackers to execute arbitrary code via a crafted packet.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2025

CVE-2013-2809

Publication date:
12/04/2014
The DNP Master Driver in the OSIsoft PI Interface before 3.1.2.54 for DNP3 allows remote attackers to cause a denial of service (interface shutdown) via a crafted TCP packet.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025

CVE-2014-1209

Publication date:
11/04/2014
VMware vSphere Client 4.0, 4.1, 5.0 before Update 3, and 5.1 before Update 2 does not properly validate updates to Client files, which allows remote attackers to trigger the downloading and execution of an arbitrary program via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2025