Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-3882

Publication date:
24/04/2019
A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2023

CVE-2019-3789

Publication date:
24/04/2019
Cloud Foundry Routing Release, all versions prior to 0.188.0, contains a vulnerability that can hijack the traffic to route services hosted outside the platform. A user with space developer permissions can create a private domain that shadows the external domain of the route service, and map that route to an app. When the gorouter receives traffic destined for the external route service, this traffic will instead be directed to the internal app using the shadow route.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2020

CVE-2019-3793

Publication date:
24/04/2019
Pivotal Apps Manager Release, versions 665.0.x prior to 665.0.28, versions 666.0.x prior to 666.0.21, versions 667.0.x prior to 667.0.7, contain an invitation service that accepts HTTP. A remote unauthenticated user could listen to network traffic and gain access to the authorization credentials used to make the invitation requests.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2020

CVE-2019-3786

Publication date:
24/04/2019
Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file of a Bosh Backup and Restore job to request extra backup files from different jobs upon restore. The exploited hooks in this metadata script were only maintained in the cfcr-etcd-release, so clusters deployed with the BBR job for etcd in this release are vulnerable.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2020

CVE-2019-7213

Publication date:
24/04/2019
SmarterTools SmarterMail 16.x before build 6985 allows directory traversal. An authenticated user could delete arbitrary files or could create files in new folders in arbitrary locations on the mail server. This could lead to command execution on the server for instance by putting files inside the web directories.
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2019

CVE-2019-9734

Publication date:
24/04/2019
Aquarius CMS through 4.3.5 writes POST and GET parameters (including passwords) to a log file due to an overwriting of configuration parameters under certain circumstances.
Severity CVSS v4.0: Pending analysis
Last modification:
19/07/2019

CVE-2019-7214

Publication date:
24/04/2019
SmarterTools SmarterMail 16.x before build 6985 allows deserialization of untrusted data. An unauthenticated attacker could run commands on the server when port 17001 was remotely accessible. This port is not accessible remotely by default after applying the Build 6985 patch.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2023

CVE-2019-9928

Publication date:
24/04/2019
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2026

CVE-2019-7212

Publication date:
24/04/2019
SmarterTools SmarterMail 16.x before build 6985 has hardcoded secret keys. An unauthenticated attacker could access other users’ emails and file attachments. It was also possible to interact with mailing lists.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2020

CVE-2019-7211

Publication date:
24/04/2019
SmarterTools SmarterMail 16.x before build 6995 has stored XSS. JavaScript code could be executed on the application by opening a malicious email or when viewing a malicious file attachment.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2019

CVE-2019-11032

Publication date:
24/04/2019
In EasyToRecruit (E2R) before 2.11, the upload feature and the Candidate Profile Management feature are prone to Cross Site Scripting (XSS) injection in multiple locations.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-13443

Publication date:
24/04/2019
EOS.IO jit-wasm 4.1 has a heap-based buffer overflow via a crafted wast file.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020