Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-14200

Publication date:
31/07/2019
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-14201

Publication date:
31/07/2019
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-14202

Publication date:
31/07/2019
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-14203

Publication date:
31/07/2019
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_mount_reply.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-14196

Publication date:
31/07/2019
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_lookup_reply.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2019-10343

Publication date:
31/07/2019
Jenkins Configuration as Code Plugin 1.24 and earlier did not properly apply masking to values expected to be hidden when logging the configuration being applied.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2019-10358

Publication date:
31/07/2019
Jenkins Maven Integration Plugin 3.3 and earlier did not apply build log decorators to module builds, potentially revealing sensitive build variables in the build log.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2019-10359

Publication date:
31/07/2019
A cross-site request forgery vulnerability in Jenkins Maven Release Plugin 0.14.0 and earlier in the M2ReleaseAction#doSubmit method allowed attackers to perform releases with attacker-specified options.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2019-10360

Publication date:
31/07/2019
A stored cross site scripting vulnerability in Jenkins Maven Release Plugin 0.14.0 and earlier allowed attackers to inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2019-10362

Publication date:
31/07/2019
Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2019-10364

Publication date:
31/07/2019
Jenkins Amazon EC2 Plugin 1.43 and earlier wrote the beginning of private keys to the Jenkins system log.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2019-10363

Publication date:
31/07/2019
Jenkins Configuration as Code Plugin 1.24 and earlier did not reliably identify sensitive values expected to be exported in their encrypted form.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023