Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-6445

Publication date:
16/01/2019
An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can cause a NULL pointer dereference and ntpd crash in ntp_control.c, related to ctl_getitem.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2019

CVE-2019-6444

Publication date:
16/01/2019
An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2019

CVE-2019-6443

Publication date:
16/01/2019
An issue was discovered in NTPsec before 1.1.3. Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2019

CVE-2019-6446

Publication date:
16/01/2019
An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2025

CVE-2019-6442

Publication date:
16/01/2019
An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request, related to config_remotely in ntp_config.c, yyparse in ntp_parser.tab.c, and yyerror in ntp_parser.y.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2019

CVE-2016-10738

Publication date:
16/01/2019
Zenbership v107 has CSRF via admin/cp-functions/event-add.php.
Severity CVSS v4.0: Pending analysis
Last modification:
18/01/2019

CVE-2016-10737

Publication date:
16/01/2019
Serendipity 2.0.4 has XSS via the serendipity_admin.php serendipity[body] parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2019

CVE-2019-6440

Publication date:
16/01/2019
Zemana AntiMalware before 3.0.658 Beta mishandles update logic.
Severity CVSS v4.0: Pending analysis
Last modification:
25/01/2019

CVE-2018-20720

Publication date:
16/01/2019
ABB Relion 630 devices 1.1 before 1.1.0.C0, 1.2 before 1.2.0.B3, and 1.3 before 1.3.0.A6 allow remote attackers to cause a denial of service (reboot) via a reboot command in an SPA message.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2023

CVE-2019-6439

Publication date:
16/01/2019
examples/benchmark/tls_bench.c in a benchmark tool in wolfSSL through 3.15.7 has a heap-based buffer overflow.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-6345

Publication date:
15/01/2019
The function number_format is vulnerable to a heap overflow issue when its second argument ($dec_points) is excessively large. The internal implementation of the function will cause a string to be created with an invalid length, which can then interact poorly with other functions. This affects all supported versions of HHVM (3.30.1 and 3.27.5 and below).
Severity CVSS v4.0: Pending analysis
Last modification:
21/09/2020

CVE-2018-7603

Publication date:
15/01/2019
In Drupal's 3rd party module search auto complete prior to versions 7.x-4.8 there is a Cross Site Scripting vulnerability. This Search Autocomplete module enables you to autocomplete textfield using data from your website (nodes, comments, etc.). The module doesn't sufficiently filter user-entered text among the autocompletion items leading to a Cross Site Scripting (XSS) vulnerability. This vulnerability can be exploited by any user allowed to create one of the autocompletion item, for instance, nodes, users, comments.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023