Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2013-4103

Publication date:
04/11/2019
Cryptocat before 2.0.22 has Remote Script Injection due to improperly sanitizing user input
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2019

CVE-2017-3989

Publication date:
04/11/2019
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-19031

Publication date:
04/11/2019
A command injection vulnerability exists when the authorized user passes crafted parameter to background process in the router. This affects 360 router series products (360 Safe Router P0,P1,P2,P3,P4), the affected version is V2.0.61.58897.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-0350

Publication date:
04/11/2019
SAP HANA Database, versions 1.0, 2.0, allows an unauthorized attacker to send a malformed connection request, which crashes the indexserver of an SAP HANA instance, leading to Denial of Service
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2013-4101

Publication date:
04/11/2019
Cryptocat before 2.0.22 Link Markup Decorator HTML Handling Weakness
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2019

CVE-2013-4100

Publication date:
04/11/2019
Cryptocat before 2.0.22 has Remote Denial of Service via username
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2019

CVE-2013-4102

Publication date:
04/11/2019
Cryptocat before 2.0.22 strophe.js Math.random() Random Number Generator Weakness
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2019

CVE-2013-4518

Publication date:
04/11/2019
RHUI (Red Hat Update Infrastructure) 2.1.3 has world readable PKI entitlement certificates
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2019

CVE-2013-4412

Publication date:
04/11/2019
slim has NULL pointer dereference when using crypt() method from glibc 2.17
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2023

CVE-2013-4423

Publication date:
04/11/2019
CloudForms stores user passwords in recoverable format
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2023

CVE-2019-14358

Publication date:
02/11/2019
On Archos Safe-T devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-18673

Publication date:
02/11/2019
On SHIFT BitBox02 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. Note: BIP39 secrets are not displayed by default on this device. The side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021