Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-20521

Publication date:
19/03/2020
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/ URI.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2020

CVE-2019-20526

Publication date:
19/03/2020
Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp password parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2020

CVE-2019-20525

Publication date:
19/03/2020
Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp driver parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2020

CVE-2019-16070

Publication date:
19/03/2020
A number of stored Cross-site Scripting (XSS) vulnerabilities were identified in NETSAS Enigma NMS 65.0.0 and prior that could allow a threat actor to inject malicious code directly into the application through web application form inputs.
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2020

CVE-2019-16066

Publication date:
19/03/2020
An unrestricted file upload vulnerability exists in user and system file upload functions in NETSAS Enigma NMS 65.0.0 and prior. This allows an attacker to upload malicious files and perform arbitrary code execution on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
23/03/2020

CVE-2019-16065

Publication date:
19/03/2020
A remote SQL injection web vulnerability was discovered in the Enigma NMS 65.0.0 and prior web application that allows an attacker to execute SQL commands to expose and compromise the web server, expose database tables and values, and potentially execute system-based commands as the mysql user. This affects the search_pattern value of the manage_hosts_short.cgi script.
Severity CVSS v4.0: Pending analysis
Last modification:
23/03/2020

CVE-2019-16064

Publication date:
19/03/2020
NETSAS Enigma NMS 65.0.0 and prior suffers from a directory traversal vulnerability that can allow an authenticated user to access files and directories stored outside of the web root folder. By exploiting this vulnerability, it is possible for an attacker to list operating-system directory contents on the server, create directories and upload files in permissible locations, and modify filenames and delete files that are accessible by the user running the web server instance.
Severity CVSS v4.0: Pending analysis
Last modification:
23/03/2020

CVE-2019-16067

Publication date:
19/03/2020
NETSAS Enigma NMS 65.0.0 and prior utilises basic authentication over HTTP for enforcing access control to the web application. The use of weak authentication transmitted over cleartext protocols can allow an attacker to steal username and password combinations by intercepting authentication traffic in transit.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-16375

Publication date:
19/03/2020
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.11, and Community Edition 5.0.x through 5.0.37 and 6.0.x through 6.0.22. An attacker who is logged in as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent composes an answer to the original article.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2023

CVE-2019-16337

Publication date:
19/03/2020
The hncbd90 component in Hancom Office 9.6.1.9403 allows a use-after-free via an unknown object in a crafted .docx file.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2020

CVE-2019-16338

Publication date:
19/03/2020
The tfo_common component in HwordApp.dll in Hancom Office 9.6.1.7634 allows a use-after-free via a crafted .docx file.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2020

CVE-2019-12127

Publication date:
19/03/2020
In ONAP OOM through Dublin, by accessing an applicable port (30234, 30290, 32010, 30270, 30224, 30281, 30254, 30285, and/or 30271), an attacker gains full access to the respective ONAP services without any authentication. All ONAP Operations Manager (OOM) setups are affected.
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2020