Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-4841

Publication date:
29/03/2018
A vulnerability has been identified in TIM 1531 IRC (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2023

CVE-2018-9117

Publication date:
29/03/2018
WireMock before 2.16.0 contains a vulnerability that allows a remote unauthenticated attacker to access local files beyond the application directory via a specially crafted XML request, aka Directory Traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-9116

Publication date:
29/03/2018
An XXE vulnerability within WireMock before 2.16.0 allows a remote unauthenticated attacker to access local files and internal resources and potentially cause a Denial of Service.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-7600

Publication date:
29/03/2018
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2018-9120

Publication date:
29/03/2018
In Crea8social 2018.2, there is Stored Cross-Site Scripting via a post.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2018

CVE-2018-9121

Publication date:
29/03/2018
In Crea8social 2018.2, there is Stored Cross-Site Scripting via a post comment.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2018

CVE-2018-9122

Publication date:
29/03/2018
In Crea8social 2018.2, there is Reflected Cross-Site Scripting via the term parameter to the /search URI.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2018

CVE-2018-9123

Publication date:
29/03/2018
In Crea8social 2018.2, there is Stored Cross-Site Scripting via a User Profile.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2018

CVE-2018-0189

Publication date:
28/03/2018
A vulnerability in the Forwarding Information Base (FIB) code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, network attacker to cause a denial of service (DoS) condition. The vulnerability is due to a limitation in the way the FIB is internally representing recursive routes. An attacker could exploit this vulnerability by injecting routes into the routing protocol that have a specific recursive pattern. The attacker must be in a position on the network that provides the ability to inject a number of recursive routes with a specific pattern. An exploit could allow the attacker to cause an affected device to reload, creating a DoS condition. Cisco Bug IDs: CSCva91655.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-0190

Publication date:
28/03/2018
Multiple vulnerabilities in the web-based user interface (web UI) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web UI of the affected software. The vulnerabilities are due to insufficient input validation of certain parameters that are passed to the affected software via the web UI. An attacker could exploit these vulnerabilities by persuading a user of the affected UI to access a malicious link or by intercepting a user request for the affected UI and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected UI or allow the attacker to access sensitive browser-based information on the user's system. Cisco Bug IDs: CSCuz38591, CSCvb09530, CSCvb10022.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-0193

Publication date:
28/03/2018
Multiple vulnerabilities in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to inject arbitrary commands into the CLI of the affected software, which could allow the attacker to gain access to the underlying Linux shell of an affected device and execute commands with root privileges on the device. The vulnerabilities exist because the affected software does not sufficiently sanitize command arguments before passing commands to the Linux shell for execution. An attacker could exploit these vulnerabilities by submitting a malicious CLI command to the affected software. A successful exploit could allow the attacker to break from the CLI of the affected software, which could allow the attacker to gain access to the underlying Linux shell on an affected device and execute arbitrary commands with root privileges on the device. Cisco Bug IDs: CSCuz03145, CSCuz56419, CSCva31971, CSCvb09542.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-0195

Publication date:
28/03/2018
A vulnerability in the Cisco IOS XE Software REST API could allow an authenticated, remote attacker to bypass API authorization checks and use the API to perform privileged actions on an affected device. The vulnerability is due to insufficient authorization checks for requests that are sent to the REST API of the affected software. An attacker could exploit this vulnerability by sending a malicious request to an affected device via the REST API. A successful exploit could allow the attacker to selectively bypass authorization checks for the REST API of the affected software and use the API to perform privileged actions on an affected device. Cisco Bug IDs: CSCuz56428.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019