Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-1783

Publication date:
05/10/2018
IBM GPFS (IBM Spectrum Scale 4.1.1.0, 4.1.1.20, 4.2.0.0, 4.2.3.10, 5.0.0 and 5.0.1.2) command line utility allows an unprivileged, authenticated user with access to a GPFS node to forcefully terminate GPFS and deny access to data available through GPFS. IBM X-Force ID: 148806.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-1647

Publication date:
05/10/2018
IBM QRadar Incident Forensics 7.2 and 7.3 does not properly restrict the size or amount of resources requested which could allow an unauthenticated user to cause a denial of service. IBM X-Force ID: 144650.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-1649

Publication date:
05/10/2018
IBM QRadar Incident Forensics 7.2 and 7.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 144655.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-6979

Publication date:
05/10/2018
The VMware Workspace ONE Unified Endpoint Management Console (A/W Console) 9.7.x prior to 9.7.0.3, 9.6.x prior to 9.6.0.7, 9.5.x prior to 9.5.0.16, 9.4.x prior to 9.4.0.22, 9.3.x prior to 9.3.0.25, 9.2.x prior to 9.2.3.27, and 9.1.x prior to 9.1.5.6 contains a SAML authentication bypass vulnerability which can be leveraged during device enrollment. This vulnerability may allow for a malicious actor to impersonate an authorized SAML session if certificate-based authentication is enabled. This vulnerability is also relevant if certificate-based authentication is not enabled, but the outcome of exploitation is limited to an information disclosure (Important Severity) in those cases.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2013-7465

Publication date:
05/10/2018
Ice Cold Apps Servers Ultimate 6.0.2(12) does not require authentication for TELNET, SSH, or FTP, which allows remote attackers to execute arbitrary code by uploading PHP scripts.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2019

CVE-2014-10075

Publication date:
05/10/2018
The karo gem 2.3.8 for Ruby allows Remote command injection via the host field.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2018

CVE-2015-9272

Publication date:
05/10/2018
The videowhisper-video-presentation plugin 3.31.17 for WordPress allows remote attackers to execute arbitrary code because vp/vw_upload.php considers a file safe when "html" are the last four characters, as demonstrated by a .phtml file containing PHP code.
Severity CVSS v4.0: Pending analysis
Last modification:
23/11/2018

CVE-2014-10076

Publication date:
05/10/2018
The wp-db-backup plugin 2.2.4 for WordPress relies on a five-character string for access control, which makes it easier for remote attackers to read backup archives via a brute-force attack.
Severity CVSS v4.0: Pending analysis
Last modification:
23/11/2018

CVE-2018-17986

Publication date:
05/10/2018
rars/user/data in razorCMS 3.4.8 allows CSRF for changing the password of an admin user.
Severity CVSS v4.0: Pending analysis
Last modification:
27/11/2018

CVE-2015-9271

Publication date:
04/10/2018
The VideoWhisper videowhisper-video-conference-integration plugin 4.91.8 for WordPress allows remote attackers to execute arbitrary code because vc/vw_upload.php considers a file safe when "html" are the last four characters, as demonstrated by a .phtml file containing PHP code, a different vulnerability than CVE-2014-1905.
Severity CVSS v4.0: Pending analysis
Last modification:
23/11/2018

CVE-2018-17983

Publication date:
04/10/2018
cext/manifest.c in Mercurial before 4.7.2 has an out-of-bounds read during parsing of a malformed manifest entry.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2018

CVE-2018-17984

Publication date:
04/10/2018
An unanchored /[a-z]{2}/ regular expression in ISPConfig before 3.1.13 makes it possible to include arbitrary files, leading to code execution. This is exploitable by authenticated users who have local filesystem access.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2018