Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-14926

Publication date:
03/08/2018
Matera Banco 1.0.0 allows CSRF, as demonstrated by a /contingency/web/messageSend/messageSendHandler.jsp request.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2018

CVE-2018-14927

Publication date:
03/08/2018
Matera Banco 1.0.0 is vulnerable to path traversal (allowing access to system files outside the default application folder) via the /contingency/servlet/ServletFileDownload file parameter, related to /contingency/web/receiptQuery/receiptDisplay.jsp.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2018

CVE-2018-14929

Publication date:
03/08/2018
Matera Banco 1.0.0 is vulnerable to multiple reflected XSS, as demonstrated by the /contingency/web/index.jsp (aka home page) url parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2018

CVE-2018-14928

Publication date:
03/08/2018
/contingency/servlet/ServletFileDownload executes as root and provides unauthenticated access to files via the file parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2018

CVE-2018-14925

Publication date:
03/08/2018
Matera Banco 1.0.0 mishandles Java errors in the backend, as demonstrated by a stack trace revealing use of net.sf.acegisecurity components.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-14923

Publication date:
03/08/2018
A vulnerability in uniview EZPlayer 1.0.6 could allow an attacker to execute arbitrary code on a targeted system via video playback.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2018

CVE-2018-9866

Publication date:
03/08/2018
A vulnerability in lack of validation of user-supplied parameters pass to XML-RPC calls on SonicWall Global Management System (GMS) virtual appliance's, allow remote user to execute arbitrary code. This vulnerability affected GMS version 8.1 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2018-3777

Publication date:
03/08/2018
Insufficient URI encoding in restforce before 3.0.0 allows attacker to inject arbitrary parameters into Salesforce API requests.
Severity CVSS v4.0: Pending analysis
Last modification:
28/02/2023

CVE-2018-14910

Publication date:
03/08/2018
SeaCMS v6.61 allows Remote Code execution by placing PHP code in an allowed IP address (aka ip) to /admin/admin_ip.php (aka /adm1n/admin_ip.php). The code is executed by visiting adm1n/admin_ip.php or data/admin/ip.php. This can also be exploited through CSRF.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2018

CVE-2018-14912

Publication date:
03/08/2018
cgit_clone_objects in CGit before 1.2.1 has a directory traversal vulnerability when `enable-http-clone=1` is not turned off, as demonstrated by a cgit/cgit.cgi/git/objects/?path=../ request.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2018

CVE-2018-14911

Publication date:
03/08/2018
A file upload vulnerability exists in ukcms v1.1.7 and earlier. The vulnerability is due to the system not strictly filtering the file upload type. An attacker can exploit the vulnerability to upload a script Trojan to admin.php/admin/configset/index/group/upload.html to gain server control by composing a request for a .txt upload and then changing it to a .php upload. The attacker must have admin access to change the upload_file_ext (aka "Allow upload file suffix") setting, and must use "php,php" in this setting to bypass the "php" restriction.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2018

CVE-2018-5490

Publication date:
03/08/2018
Read-Only export policy rules are not correctly enforced in Clustered Data ONTAP 8.3 Release Candidate versions and therefore may allow more than "read-only" access from authenticated SMBv2 and SMBv3 clients. This behavior has been resolved in the GA release. Customers running prior release candidates (RCs) are requested to update their systems to the NetApp Data ONTAP 8.3 GA release.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019