Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-15278

Publication date:
26/01/2020
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to bypass authorization and access sensitive information related to the device. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2020

CVE-2019-12629

Publication date:
26/01/2020
A vulnerability in the WebUI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2020

CVE-2019-15255

Publication date:
26/01/2020
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access sensitive information related to the device. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2020

CVE-2019-12619

Publication date:
26/01/2020
A vulnerability in the web interface for Cisco SD-WAN Solution vManage could allow an authenticated, remote attacker to impact the integrity of an affected system by executing arbitrary SQL queries. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input that includes SQL statements to an affected system. A successful exploit could allow the attacker to modify entries in some database tables, affecting the integrity of the data.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2020

CVE-2020-7981

Publication date:
25/01/2020
sql.rb in Geocoder before 1.6.1 allows Boolean-based SQL injection when within_bounding_box is used in conjunction with untrusted sw_lat, sw_lng, ne_lat, or ne_lng data.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2020

CVE-2019-0141

Publication date:
25/01/2020
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-7980

Publication date:
25/01/2020
Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2023

CVE-2020-7596

Publication date:
25/01/2020
Codecov npm module before 3.6.2 allows remote attackers to execute arbitrary commands via the "gcov-args" argument.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2013-1744

Publication date:
25/01/2020
IRIS citations management tool through 1.3 allows remote attackers to execute arbitrary commands.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2020

CVE-2012-6613

Publication date:
25/01/2020
D-Link DSR-250N devices with firmware 1.05B73_WW allow Persistent Root Access because of the admin password for the admin account.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2020

CVE-2012-6344

Publication date:
25/01/2020
Novell ZENworks Configuration Management before 11.2.4 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2020

CVE-2012-6345

Publication date:
25/01/2020
Novell ZENworks Configuration Management before 11.2.4 allows obtaining sensitive trace information.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2020