Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-15085

Publication date:
20/09/2019
An issue was discovered in PRiSE adAS 1.7.0. The current database password is embedded in the change password form.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-15087

Publication date:
20/09/2019
An issue was discovered in PRiSE adAS 1.7.0. An authenticated user can change the function used to hash passwords to any function, leading to remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-15088

Publication date:
20/09/2019
An issue was discovered in PRiSE adAS 1.7.0. Password hashes are compared using the equality operator. Thus, under specific circumstances, it is possible to bypass login authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-14911

Publication date:
20/09/2019
An issue was discovered in PRiSE adAS 1.7.0. The OPENSSO module does not properly escape output on error, leading to reflected XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2019

CVE-2019-14912

Publication date:
20/09/2019
An issue was discovered in PRiSE adAS 1.7.0. The OPENSSO module does not properly check the goto parameter, leading to an open redirect that leaks the session cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2019

CVE-2019-14913

Publication date:
20/09/2019
An issue was discovered in PRiSE adAS 1.7.0. Log data are not properly escaped, leading to persistent XSS in the administration panel.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2019

CVE-2019-14914

Publication date:
20/09/2019
An issue was discovered in PRiSE adAS 1.7.0. The path is not properly escaped in the medatadata_del method, leading to an arbitrary file read and deletion via Directory Traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2019

CVE-2019-14915

Publication date:
20/09/2019
An issue was discovered in PRiSE adAS 1.7.0. Certificate data are not properly escaped. This leads to XSS when submitting a rogue certificate.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2019

CVE-2019-16531

Publication date:
20/09/2019
LayerBB before 1.1.4 has multiple CSRF issues, as demonstrated by changing the System Settings via admin/general.php.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2019

CVE-2019-9719

Publication date:
19/09/2019
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf. NOTE: Third parties dispute that this is a vulnerability because “no evidence of a vulnerability is provided” and only “a generic warning from a static code analysis” is provided
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2019-9717

Publication date:
19/09/2019
In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-9720

Publication date:
19/09/2019
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021