Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-6446

Publication date:
16/01/2019
An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2025

CVE-2019-6442

Publication date:
16/01/2019
An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request, related to config_remotely in ntp_config.c, yyparse in ntp_parser.tab.c, and yyerror in ntp_parser.y.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2019

CVE-2016-10738

Publication date:
16/01/2019
Zenbership v107 has CSRF via admin/cp-functions/event-add.php.
Severity CVSS v4.0: Pending analysis
Last modification:
18/01/2019

CVE-2016-10737

Publication date:
16/01/2019
Serendipity 2.0.4 has XSS via the serendipity_admin.php serendipity[body] parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2019

CVE-2019-6440

Publication date:
16/01/2019
Zemana AntiMalware before 3.0.658 Beta mishandles update logic.
Severity CVSS v4.0: Pending analysis
Last modification:
25/01/2019

CVE-2018-20720

Publication date:
16/01/2019
ABB Relion 630 devices 1.1 before 1.1.0.C0, 1.2 before 1.2.0.B3, and 1.3 before 1.3.0.A6 allow remote attackers to cause a denial of service (reboot) via a reboot command in an SPA message.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2023

CVE-2019-6439

Publication date:
16/01/2019
examples/benchmark/tls_bench.c in a benchmark tool in wolfSSL through 3.15.7 has a heap-based buffer overflow.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-6345

Publication date:
15/01/2019
The function number_format is vulnerable to a heap overflow issue when its second argument ($dec_points) is excessively large. The internal implementation of the function will cause a string to be created with an invalid length, which can then interact poorly with other functions. This affects all supported versions of HHVM (3.30.1 and 3.27.5 and below).
Severity CVSS v4.0: Pending analysis
Last modification:
21/09/2020

CVE-2018-7603

Publication date:
15/01/2019
In Drupal's 3rd party module search auto complete prior to versions 7.x-4.8 there is a Cross Site Scripting vulnerability. This Search Autocomplete module enables you to autocomplete textfield using data from your website (nodes, comments, etc.). The module doesn't sufficiently filter user-entered text among the autocompletion items leading to a Cross Site Scripting (XSS) vulnerability. This vulnerability can be exploited by any user allowed to create one of the autocompletion item, for instance, nodes, users, comments.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-3554

Publication date:
15/01/2019
Wangle's AcceptRoutingHandler incorrectly casts a socket when accepting a TLS 1.3 connection, leading to a potential denial of service attack against systems accepting such connections. This affects versions of Wangle prior to v2019.01.14.00
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-3557

Publication date:
15/01/2019
The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return valid values consistently. This affects all supported versions of HHVM (3.30 and 3.27.4 and below).
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-0030

Publication date:
15/01/2019
Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023