Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-11448

Publication date:
22/04/2019
An issue was discovered in Zoho ManageEngine Applications Manager 11.0 through 14.0. An unauthenticated user can gain the authority of SYSTEM on the server due to a Popup_SLA.jsp sid SQL injection vulnerability. For example, the attacker can subsequently write arbitrary text to a .vbs file.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2019

CVE-2019-11447

Publication date:
22/04/2019
An issue was discovered in CutePHP CuteNews 2.1.2. An attacker can infiltrate the server through the avatar upload process in the profile area via the avatar_file field to index.php?mod=main&opt=personal. There is no effective control of $imgsize in /core/modules/dashboard.php. The header content of a file can be changed and the control can be bypassed for code execution. (An attacker can use the GIF header for this.)
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2020

CVE-2019-11428

Publication date:
22/04/2019
I, Librarian 4.10 has XSS via the export.php export_files parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2019

CVE-2019-11426

Publication date:
22/04/2019
An XSS issue was discovered in app/admincp/template/admincp.header.php in idreamsoft iCMS 7.0.14 via the admincp.php?app=config tab parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2019

CVE-2019-11427

Publication date:
22/04/2019
An XSS issue was discovered in app/search/search.app.php in idreamsoft iCMS 7.0.14 via the public/api.php?app=search q parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2019

CVE-2019-11414

Publication date:
22/04/2019
An issue was discovered on Intelbras IWR 3000N 1.5.0 devices. When the administrator password is changed from a certain client IP address, administrative authorization remains available to any client at that IP address, leading to complete control of the router.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2019

CVE-2019-11445

Publication date:
22/04/2019
OpenKM 6.3.2 through 6.3.7 allows an attacker to upload a malicious JSP file into the /okm:root directories and move that file to the home directory of the site, via frontend/FileUpload and admin/repository_export.jsp. This is achieved by interfering with the Filesystem path control in the admin's Export field. As a result, attackers can gain remote code execution through the application server with root privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2019

CVE-2019-11418

Publication date:
22/04/2019
apply.cgi on the TRENDnet TEW-632BRP 1.010B32 router has a buffer overflow via long strings to the SOAPACTION:HNAP1 interface.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2019

CVE-2019-11444

Publication date:
22/04/2019
An issue was discovered in Liferay Portal CE 7.1.2 GA3. An attacker can use Liferay's Groovy script console to execute OS commands. Commands can be executed via a [command].execute() call, as demonstrated by "def cmd =" in the ServerAdminPortlet_script value to group/control_panel/manage. Valid credentials for an application administrator user account are required. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to run groovy scripts and therefore not a design flaw
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2019-11416

Publication date:
22/04/2019
A CSRF issue was discovered on Intelbras IWR 3000N 1.5.0 devices, leading to complete control of the router, as demonstrated by v1/system/user.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2019

CVE-2019-11412

Publication date:
22/04/2019
An issue was discovered in Artifex MuJS 1.0.5. jscompile.c can cause a denial of service (invalid stack-frame jump) because it lacks an ENDTRY opcode call.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-11417

Publication date:
22/04/2019
system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021