Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-17595

Publication date:
14/10/2019
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
Severity CVSS v4.0: Pending analysis
Last modification:
08/02/2021

CVE-2019-17592

Publication date:
14/10/2019
The csv-parse module before 4.4.6 for Node.js is vulnerable to Regular Expression Denial of Service. The __isInt() function contains a malformed regular expression that processes large crafted input very slowly. This is triggered when using the cast option.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-14823

Publication date:
14/10/2019
A flaw was found in the "Leaf and Chain" OCSP policy implementation in JSS' CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to attacks such as Man in the Middle.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2023

CVE-2019-14737

Publication date:
14/10/2019
Ubisoft Uplay 92.0.0.6280 has Insecure Permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2017-14948

Publication date:
14/10/2019
Certain D-Link products are affected by: Buffer Overflow. This affects DIR-880L 1.08B04 and DIR-895 L/R 1.13b03. The impact is: execute arbitrary code (remote). The component is: htdocs/fileaccess.cgi. The attack vector is: A crafted HTTP request handled by fileacces.cgi could allow an attacker to mount a ROP attack: if the HTTP header field CONTENT_TYPE starts with ''boundary=' followed by more than 256 characters, a buffer overflow would be triggered, potentially causing code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2021

CVE-2019-16282

Publication date:
14/10/2019
In NCH Express Invoice v7.12, persistent cross site scripting (XSS) exists via the Invoices/Items/Customers/Quotes input field. An authenticated unprivileged user can add/modify the Invoices/Items/Customers fields parameter to inject arbitrary JavaScript.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2019

CVE-2019-3767

Publication date:
14/10/2019
Dell ImageAssist versions prior to 8.7.15 contain an information disclosure vulnerability. Dell ImageAssist stores some sensitive encrypted information in the images it creates. A privileged user of a system running an operating system that was deployed with Dell ImageAssist could potentially retrieve this sensitive information to then compromise the system and related systems.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2020

CVE-2019-12941

Publication date:
14/10/2019
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-14227

Publication date:
14/10/2019
OX App Suite 7.10.1 and 7.10.2 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2019

CVE-2019-14225

Publication date:
14/10/2019
OX App Suite 7.10.1 and 7.10.2 allows SSRF.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2019

CVE-2019-14226

Publication date:
14/10/2019
OX App Suite through 7.10.2 has Insecure Permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2019

CVE-2019-17044

Publication date:
14/10/2019
An issue was discovered in BMC Patrol Agent 9.0.10i. Weak execution permissions on the PatrolAgent SUID binary could allow an attacker with "patrol" privileges to elevate his/her privileges to the ones of the "root" user by specially crafting a shared library .so file that will be loaded during execution.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2019