Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-13267

Publication date:
27/08/2019
TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. In order to transfer data from the host network to the guest network, the sender joins and then leaves an IGMP group. After it leaves, the router (following the IGMP protocol) creates an IGMP Membership Query packet with the Group IP and sends it to both the Host and the Guest networks. The data is transferred within the Group IP field, which is completely controlled by the sender.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-15698

Publication date:
27/08/2019
In Octopus Deploy 2019.7.3 through 2019.7.9, in certain circumstances, an authenticated user with VariableView permissions could view sensitive values. This is fixed in 2019.7.10.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2022

CVE-2019-13484

Publication date:
27/08/2019
In Xymon through 4.3.28, a buffer overflow exists in the status-log viewer CGI because of   expansion in appfeed.c.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2019

CVE-2019-13452

Publication date:
27/08/2019
In Xymon through 4.3.28, a buffer overflow vulnerability exists in reportlog.c.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2019

CVE-2019-13451

Publication date:
27/08/2019
In Xymon through 4.3.28, a buffer overflow vulnerability exists in history.c.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2019

CVE-2019-13274

Publication date:
27/08/2019
In Xymon through 4.3.28, an XSS vulnerability exists in the csvinfo CGI script due to insufficient filtering of the db parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2019

CVE-2019-13271

Publication date:
27/08/2019
Edimax BR-6208AC V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet mask, but these routers did not restrict this traffic in any way. Depending on this factor, one must use either the lower 8 bits of the IP address, or the entire 32 bits, as the data payload.)
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-13273

Publication date:
27/08/2019
In Xymon through 4.3.28, a buffer overflow vulnerability exists in the csvinfo CGI script. The overflow may be exploited by sending a crafted GET request that triggers an sprintf of the srcdb parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-13455

Publication date:
27/08/2019
In Xymon through 4.3.28, a stack-based buffer overflow vulnerability exists in the alert acknowledgment CGI tool because of   expansion in acknowledge.c.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-13485

Publication date:
27/08/2019
In Xymon through 4.3.28, a stack-based buffer overflow vulnerability exists in the history viewer component via a long hostname or service parameter to history.c.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-13486

Publication date:
27/08/2019
In Xymon through 4.3.28, a stack-based buffer overflow exists in the status-log viewer component because of   expansion in svcstatus.c.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-14314

Publication date:
27/08/2019
A SQL injection vulnerability exists in the Imagely NextGEN Gallery plugin before 3.2.11 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via modules/nextgen_gallery_display/package.module.nextgen_gallery_display.php.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2019