Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-20808

Publication date:
28/06/2019
An XSS issue has been found with rd.cgi in Pulse Secure Pulse Connect Secure 8.3RX before 8.3R3 due to improper header sanitization. This is not applicable to 8.1RX.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2024

CVE-2018-14868

Publication date:
28/06/2019
Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-14886

Publication date:
28/06/2019
The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-14916

Publication date:
28/06/2019
LOYTEC LGATE-902 6.3.2 devices allow Arbitrary file deletion.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-4269

Publication date:
28/06/2019
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Admin Console could allow a remote attacker to obtain sensitive information when a specially crafted url causes a stack trace to be dumped. IBM X-Force ID: 160202.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2018-15519

Publication date:
28/06/2019
Various Lexmark devices have a Buffer Overflow (issue 1 of 2).
Severity CVSS v4.0: Pending analysis
Last modification:
05/07/2019

CVE-2018-14919

Publication date:
28/06/2019
LOYTEC LGATE-902 6.3.2 devices allow XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2019

CVE-2019-4369

Publication date:
28/06/2019
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-9846

Publication date:
28/06/2019
RockOA 1.8.7 allows remote attackers to obtain sensitive information because the webmain/webmainAction.php publictreestore method constructs a SQL WHERE clause unsafely by using the pidfields and idfields parameters, aka background SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
05/07/2019

CVE-2018-15520

Publication date:
28/06/2019
Various Lexmark devices have a Buffer Overflow (issue 2 of 2).
Severity CVSS v4.0: Pending analysis
Last modification:
05/07/2019

CVE-2019-13012

Publication date:
28/06/2019
The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-15555

Publication date:
28/06/2019
On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user "root" and password "admin" by using the enabled onboard UART headers.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020