Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-17373

Publication date:
09/10/2019
Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-17372

Publication date:
09/10/2019
Certain NETGEAR devices allow remote attackers to disable all authentication requirements by visiting genieDisableLanChanged.cgi. The attacker can then, for example, visit MNU_accessPassword_recovered.html to obtain a valid new admin password. This affects AC1450, D8500, DC112A, JNDR3000, LG2200D, R4500, R6200, R6200V2, R6250, R6300, R6300v2, R6400, R6700, R6900P, R6900, R7000P, R7000, R7100LG, R7300, R7900, R8000, R8300, R8500, WGR614v10, WN2500RPv2, WNDR3400v2, WNDR3700v3, WNDR4000, WNDR4500, WNDR4500v2, WNR1000, WNR1000v3, WNR3500L, and WNR3500L.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2019

CVE-2019-17371

Publication date:
09/10/2019
gif2png 2.5.13 has a memory leak in the writefile function.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2022

CVE-2019-17370

Publication date:
09/10/2019
OTCMS v3.85 allows arbitrary PHP Code Execution because admin/sysCheckFile_deal.php blocks "into outfile" in a SELECT statement, but does not block the "into/**/outfile" manipulation. Therefore, the attacker can create a .php file.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-17353

Publication date:
09/10/2019
An issue discovered on D-Link DIR-615 devices with firmware version 20.05 and 20.07. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2021

CVE-2019-13051

Publication date:
09/10/2019
Pi-Hole 4.3 allows Command Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2019

CVE-2019-15719

Publication date:
09/10/2019
Altair PBS Professional through 19.1.2 allows Privilege Escalation because an attacker can send a message directly to pbs_mom, which fails to properly authenticate the message. This results in code execution as an arbitrary user.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-17354

Publication date:
09/10/2019
wan.htm page on Zyxel NBG-418N v2 with firmware version V1.00(AARP.9)C0 can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify data fields of the page.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-17368

Publication date:
09/10/2019
S-CMS v1.5 has XSS in tpl.php via the member/member_login.php from parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-17369

Publication date:
09/10/2019
OTCMS v3.85 has CSRF in the admin/member_deal.php Admin Panel page, leading to creation of a new management group account, as demonstrated by superadmin.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2019

CVE-2019-17362

Publication date:
09/10/2019
In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2023

CVE-2019-3980

Publication date:
08/10/2019
The Solarwinds Dameware Mini Remote Client agent v12.1.0.89 supports smart card authentication which can allow a user to upload an executable to be executed on the DWRCS.exe host. An unauthenticated, remote attacker can request smart card login and upload and execute an arbitrary executable run under the Local System account.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021