Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-15719

Publication date:
09/10/2019
Altair PBS Professional through 19.1.2 allows Privilege Escalation because an attacker can send a message directly to pbs_mom, which fails to properly authenticate the message. This results in code execution as an arbitrary user.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-17354

Publication date:
09/10/2019
wan.htm page on Zyxel NBG-418N v2 with firmware version V1.00(AARP.9)C0 can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify data fields of the page.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-17368

Publication date:
09/10/2019
S-CMS v1.5 has XSS in tpl.php via the member/member_login.php from parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-17369

Publication date:
09/10/2019
OTCMS v3.85 has CSRF in the admin/member_deal.php Admin Panel page, leading to creation of a new management group account, as demonstrated by superadmin.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2019

CVE-2019-17362

Publication date:
09/10/2019
In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2023

CVE-2019-3980

Publication date:
08/10/2019
The Solarwinds Dameware Mini Remote Client agent v12.1.0.89 supports smart card authentication which can allow a user to upload an executable to be executed on the DWRCS.exe host. An unauthenticated, remote attacker can request smart card login and upload and execute an arbitrary executable run under the Local System account.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-0379

Publication date:
08/10/2019
SAP Process Integration, business-to-business add-on, versions 1.0, 2.0, does not perform authentication check properly when the default security provider is changed to BouncyCastle (BC), leading to Missing Authentication Check
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-0380

Publication date:
08/10/2019
Under certain conditions, SAP Landscape Management enterprise edition, before version 3.0, allows custom secure parameters’ default values to be part of the application logs leading to Information Disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2020

CVE-2019-0378

Publication date:
08/10/2019
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before version 4.2, does not sufficiently encode user-controlled inputs and allows an attacker to store malicious scripts in the file name of the background image resulting in Stored Cross-Site Scripting.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2019

CVE-2019-0377

Publication date:
08/10/2019
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before versions 4.2, does not sufficiently encode user-controlled inputs and allows an attacker to store malicious scripts in the input controls, resulting in Stored Cross-Site Scripting.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2019

CVE-2019-0376

Publication date:
08/10/2019
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before versions 4.2 and 4.3, does not sufficiently encode user-controlled inputs and allows an attacker to save malicious scripts in the publication name, which can be executed later by the victim, resulting in Stored Cross-Site Scripting.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2019

CVE-2019-0375

Publication date:
08/10/2019
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before versions 4.2 and 4.3, does not sufficiently encode user-controlled inputs and allows execution of scripts in the export dialog box of the report name resulting in reflected Cross-Site Scripting.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2019