Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-6243

Publication date:
07/05/2019
NVIDIA Tegra TLK Widevine Trust Application contains a vulnerability in which missing the input parameter checking of video metadata count may lead to Arbitrary Code Execution, Denial of Service or Escalation of Privileges. Android ID: A-72315075. Severity Rating: High. Version: N/A.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-6634

Publication date:
07/05/2019
A vulnerability in Parsec Windows 142-0 and Parsec 'Linux Ubuntu 16.04 LTS Desktop' Build 142-1 allows unauthorized users to maintain access to an account.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2019-7746

Publication date:
07/05/2019
JioFi 4 jmr1140 Amtel_JMR1140_R12.07 devices allow remote attackers to obtain an admin token by making a /cgi-bin/qcmap_auth type=getuser request and then reading the token field. This token value can then be used to change the Wi-Fi password or perform a factory reset.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2019

CVE-2019-7745

Publication date:
07/05/2019
JioFi 4 jmr1140 Amtel_JMR1140_R12.07 devices allow remote attackers to obtain the Wi-Fi password by making a cgi-bin/qcmap_web_cgi Page=GetWiFi_Setting request and then reading the wpa_security_key field.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-4207

Publication date:
07/05/2019
IBM TRIRIGA Application Platform 3.5.3 and 3.6.0 may disclose sensitive information only available to a local user that could be used in further attacks against the system. IBM X-Force ID: 159148.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2019-4208

Publication date:
07/05/2019
IBM TRIRIGA Application Platform 3.5.3 and 3.6.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 159129.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2019-7541

Publication date:
07/05/2019
Rukovoditel through 2.4.1 allows XSS via a URL that lacks a module=users%2flogin substring.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2019

CVE-2019-7427

Publication date:
07/05/2019
XSS exists in Zoho ManageEngine Netflow Analyzer Professional v7.0.0.2 in the Administration zone "/netflow/jspui/linkdownalertConfig.jsp" file in the autorefTime or graphTypes parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2019

CVE-2019-7426

Publication date:
07/05/2019
XSS exists in Zoho ManageEngine Netflow Analyzer Professional v7.0.0.2 in the Administration zone "/netflow/jspui/linkdownalertConfig.jsp" file in the groupDesc, groupName, groupID, or task parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2019

CVE-2019-7687

Publication date:
07/05/2019
cgi-bin/qcmap_web_cgi on JioFi 4 jmr1140 Amtel_JMR1140_R12.07 devices has POST based reflected XSS via the Page parameter. No sanitization is performed for user input data.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2019

CVE-2019-7443

Publication date:
07/05/2019
KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-7564

Publication date:
07/05/2019
An issue was discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices. The password reset functionality of the Wireless SSID doesn't require any type of authentication. By making a POST request to the regx/wireless/wl_security_2G.asp URI, the attacker can change the password of the Wi-FI network.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020