Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-6546

Publication date:
09/05/2019
GE Communicator, all versions prior to 4.0.517, allows an attacker to place malicious files within the working directory of the program, which may allow an attacker to manipulate widgets and UI elements.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2022

CVE-2017-12788

Publication date:
09/05/2019
Multiple cross-site scripting (XSS) vulnerabilities in admin/index.php in Metinfo 5.3.18 allows remote attackers to inject arbitrary web script or HTML via the (1) class1 parameter or the (2) anyid parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2019

CVE-2019-11323

Publication date:
09/05/2019
HAProxy before 1.9.7 mishandles a reload with rotated keys, which triggers use of uninitialized, and very predictable, HMAC keys. This is related to an include/types/ssl_sock.h error.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-11837

Publication date:
09/05/2019
njs through 0.3.1, used in NGINX, has a segmentation fault in String.prototype.toBytes for negative arguments, related to nxt_utf8_next in nxt/nxt_utf8.h and njs_string_offset in njs/njs_string.c.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2022

CVE-2019-11838

Publication date:
09/05/2019
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.splice after a resize, related to njs_array_prototype_splice in njs/njs_array.c, because of njs_array_expand size mishandling.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2022

CVE-2019-11839

Publication date:
09/05/2019
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.push after a resize, related to njs_array_prototype_push in njs/njs_array.c, because of njs_array_expand size mishandling.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2022

CVE-2019-0226

Publication date:
09/05/2019
Apache Karaf Config service provides a install method (via service or MBean) that could be used to travel in any directory and overwrite existing file. The vulnerability is low if the Karaf process user has limited permission on the filesystem. Any Apache Karaf version before 4.2.5 is impacted. User should upgrade to Apache Karaf 4.2.5 or later.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-11353

Publication date:
09/05/2019
The EnGenius EWS660AP router with firmware 2.0.284 allows an attacker to execute arbitrary commands using the built-in ping and traceroute utilities by using different payloads and injecting multiple parameters. This vulnerability is fixed in a later firmware version.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-9847

Publication date:
09/05/2019
A vulnerability in LibreOffice hyperlink processing allows an attacker to construct documents containing hyperlinks pointing to the location of an executable on the target users file system. If the hyperlink is activated by the victim the executable target is unconditionally launched. Under Windows and macOS when processing a hyperlink target explicitly activated by the user there was no judgment made on whether the target was an executable file, so such executable targets were launched unconditionally. This issue affects: All LibreOffice Windows and macOS versions prior to 6.1.6; LibreOffice Windows and macOS versions in the 6.2 series prior to 6.2.3.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2021

CVE-2019-11836

Publication date:
09/05/2019
The Rediffmail (aka com.rediff.mail.and) application 2.2.6 for Android has cleartext mail content in file storage, persisting after a logout.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-11820

Publication date:
09/05/2019
Information exposure through process environment vulnerability in Synology Calendar before 2.3.3-0620 allows local users to obtain credentials via cmdline.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2021

CVE-2019-11834

Publication date:
09/05/2019
cJSON before 1.7.11 allows out-of-bounds access, related to \x00 in a string literal.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025