Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-17384

Publication date:
09/10/2019
The animate-it plugin before 2.3.4 for WordPress has XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-17385

Publication date:
09/10/2019
The animate-it plugin before 2.3.5 for WordPress has XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-17375

Publication date:
09/10/2019
cPanel before 82.0.15 allows API token credentials to persist after an account has been renamed or terminated (SEC-517).
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2019

CVE-2019-17128

Publication date:
09/10/2019
Netreo OmniCenter through 12.1.1 allows unauthenticated SQL Injection (Boolean Based Blind) in the redirect parameters and parameter name of the login page through a GET request. The injection allows an attacker to read sensitive information from the database used by the application.
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2019

CVE-2019-14808

Publication date:
09/10/2019
An issue was discovered in the RENPHO application 3.0.0 for iOS. It transmits JSON data unencrypted to a server without an integrity check, if a user changes personal data in his profile tab (e.g., exposure of his birthday) or logs into his account (i.e., exposure of credentials).
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-13529

Publication date:
09/10/2019
An attacker could send a malicious link to an authenticated operator, which may allow remote attackers to perform actions with the permissions of the user on the Sunny WebBox Firmware Version 1.6 and prior. This device uses IP addresses to maintain communication after a successful login, which would increase the ease of exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2019

CVE-2018-5745

Publication date:
09/10/2019
"managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2019

CVE-2019-11341

Publication date:
09/10/2019
On certain Samsung P(9.0) phones, an attacker with physical access can start a TCP Dump capture without the user's knowledge. This feature of the Service Mode application is available after entering the *#9900# check code, but is protected by an OTP password. However, this password is created locally and (due to mishandling of cryptography) can be obtained easily by reversing the password creation logic.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2019

CVE-2019-15226

Publication date:
09/10/2019
Upon receiving each incoming request header data, Envoy will iterate over existing request headers to verify that the total size of the headers stays below a maximum limit. The implementation in versions 1.10.0 through 1.11.1 for HTTP/1.x traffic and all versions of Envoy for HTTP/2 traffic had O(n^2) performance characteristics. A remote attacker may craft a request that stays below the maximum request header size but consists of many thousands of small headers to consume CPU and result in a denial-of-service attack.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2019

CVE-2019-11212

Publication date:
09/10/2019
The MDM server component of TIBCO Software Inc's TIBCO MDM contains multiple vulnerabilities that theoretically allow an authenticated user with specific roles to perform cross-site scripting (XSS) attacks. This issue affects TIBCO Software Inc.'s TIBCO MDM version 9.0.1 and prior versions; version 9.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2019

CVE-2019-15859

Publication date:
09/10/2019
Password disclosure in the web interface on socomec DIRIS A-40 devices before 48250501 allows a remote attacker to get full access to a device via the /password.jsn URI.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-5732

Publication date:
09/10/2019
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2020