Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-8087

Publication date:
22/10/2019
Information Leakage in PPPoE Packet Padding in AVM Fritz!Box 7490 with Firmware versions Fritz!OS 6.80 and 6.83 allows physically proximate attackers to view slices of previously transmitted packets or portions of memory via via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2019

CVE-2019-12290

Publication date:
22/10/2019
GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-17189

Publication date:
22/10/2019
totemodata 3.0.0_b936 has XSS via a folder name.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2019

CVE-2019-12967

Publication date:
22/10/2019
Stephan Mooltipass Moolticute through 0.42.1 (and possibly earlier versions) has Incorrect Access Control.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2019

CVE-2019-4523

Publication date:
22/10/2019
IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 165481.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2019

CVE-2019-11674

Publication date:
22/10/2019
Man-in-the-middle vulnerability in Micro Focus Self Service Password Reset, affecting all versions prior to 4.4.0.4. The vulnerability could exploit invalid certificate validation and may result in a man-in-the-middle attack.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-17424

Publication date:
22/10/2019
A stack-based buffer overflow in the processPrivilage() function in IOS/process-general.c in nipper-ng 0.11.10 allows remote attackers (serving firewall configuration files) to achieve Remote Code Execution or Denial Of Service via a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2019

CVE-2019-16404

Publication date:
21/10/2019
Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2019

CVE-2019-17400

Publication date:
21/10/2019
The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2019

CVE-2019-17498

Publication date:
21/10/2019
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-17220

Publication date:
21/10/2019
Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2019

CVE-2019-16969

Publication date:
21/10/2019
In FusionPBX up to 4.5.7, the file app\fifo_list\fifo_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023