Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-3793

Publication date:
24/04/2019
Pivotal Apps Manager Release, versions 665.0.x prior to 665.0.28, versions 666.0.x prior to 666.0.21, versions 667.0.x prior to 667.0.7, contain an invitation service that accepts HTTP. A remote unauthenticated user could listen to network traffic and gain access to the authorization credentials used to make the invitation requests.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2020

CVE-2019-3786

Publication date:
24/04/2019
Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file of a Bosh Backup and Restore job to request extra backup files from different jobs upon restore. The exploited hooks in this metadata script were only maintained in the cfcr-etcd-release, so clusters deployed with the BBR job for etcd in this release are vulnerable.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2020

CVE-2019-7213

Publication date:
24/04/2019
SmarterTools SmarterMail 16.x before build 6985 allows directory traversal. An authenticated user could delete arbitrary files or could create files in new folders in arbitrary locations on the mail server. This could lead to command execution on the server for instance by putting files inside the web directories.
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2019

CVE-2019-9734

Publication date:
24/04/2019
Aquarius CMS through 4.3.5 writes POST and GET parameters (including passwords) to a log file due to an overwriting of configuration parameters under certain circumstances.
Severity CVSS v4.0: Pending analysis
Last modification:
19/07/2019

CVE-2019-7214

Publication date:
24/04/2019
SmarterTools SmarterMail 16.x before build 6985 allows deserialization of untrusted data. An unauthenticated attacker could run commands on the server when port 17001 was remotely accessible. This port is not accessible remotely by default after applying the Build 6985 patch.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2023

CVE-2019-9928

Publication date:
24/04/2019
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2026

CVE-2019-7212

Publication date:
24/04/2019
SmarterTools SmarterMail 16.x before build 6985 has hardcoded secret keys. An unauthenticated attacker could access other users’ emails and file attachments. It was also possible to interact with mailing lists.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2020

CVE-2019-7211

Publication date:
24/04/2019
SmarterTools SmarterMail 16.x before build 6995 has stored XSS. JavaScript code could be executed on the application by opening a malicious email or when viewing a malicious file attachment.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2019

CVE-2019-11032

Publication date:
24/04/2019
In EasyToRecruit (E2R) before 2.11, the upload feature and the Candidate Profile Management feature are prone to Cross Site Scripting (XSS) injection in multiple locations.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-13443

Publication date:
24/04/2019
EOS.IO jit-wasm 4.1 has a heap-based buffer overflow via a crafted wast file.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-10239

Publication date:
24/04/2019
Robotronic RunAsSpc 3.7.0.0 protects stored credentials insufficiently, which allows locally authenticated attackers (under the same user context) to obtain cleartext credentials of the stored account.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-11081

Publication date:
24/04/2019
A default username and password in Dentsply Sirona Sidexis 4.3.1 and earlier allows an attacker to gain administrative access to the application server.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020