Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2014-2901

Publication date:
21/11/2019
wolfssl before 3.2.0 does not properly issue certificates for a server's hostname.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2019

CVE-2014-5254

Publication date:
21/11/2019
xcfa before 5.0.1 creates temporary files insecurely which could allow local users to launch a symlink attack and overwrite arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2019

CVE-2015-3140

Publication date:
21/11/2019
Multiple cross-site request forgery (CSRF) vulnerabilities in Synametrics Technologies SynaMan before 3.5 Build 1451, Syncrify before 3.7 Build 856, and SynTail before 1.5 Build 567
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2019

CVE-2014-8356

Publication date:
21/11/2019
The web administrative portal in Zhone zNID 2426A before S3.0.501 allows remote authenticated users to bypass intended access restrictions via a modified server response, related to an insecure direct object reference.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2019

CVE-2012-1001

Publication date:
21/11/2019
Multiple cross-site scripting (XSS) vulnerabilities in Chyrp before 2.1.2 and before 2.5 Beta 2 allow remote attackers to inject arbitrary web script or HTML via the (1) content parameter to includes/ajax.php or (2) body parameter to includes/error.php.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2019-19207

Publication date:
21/11/2019
rConfig 3.9.2 allows devices.php?searchColumn= SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2019

CVE-2019-19203

Publication date:
21/11/2019
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-19204

Publication date:
21/11/2019
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-5636

Publication date:
21/11/2019
When a Beckhoff TwinCAT Runtime receives a malformed UDP packet, the ADS Discovery Service shuts down. Note that the TwinCAT devices are still performing as normal. This issue affects TwinCAT 2 version 2304 (and prior) and TwinCAT 3.1 version 4204.0 (and prior).
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2020

CVE-2019-5637

Publication date:
21/11/2019
When Beckhoff TwinCAT is configured to use the Profinet driver, a denial of service of the controller could be reached by sending a malformed UDP packet to the device. This issue affects TwinCAT 2 version 2304 (and prior) and TwinCAT 3.1 version 4204.0 (and prior).
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2020

CVE-2013-3314

Publication date:
21/11/2019
The Loftek Nexus 543 IP Camera allows remote attackers to obtain (1) IP addresses via a request to get_realip.cgi or (2) firmware versions (ui and system), timestamp, serial number, p2p port number, and wifi status via a request to get_status.cgi.
Severity CVSS v4.0: Pending analysis
Last modification:
27/11/2019

CVE-2013-3313

Publication date:
21/11/2019
The Loftek Nexus 543 IP Camera stores passwords in cleartext, which allows remote attackers to obtain sensitive information via an HTTP GET request to check_users.cgi. NOTE: cleartext passwords can also be obtained from proc/kcore when leveraging the directory traversal vulnerability in CVE-2013-3311.
Severity CVSS v4.0: Pending analysis
Last modification:
27/11/2019