Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-5188

Publication date:
08/01/2020
A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-0009

Publication date:
08/01/2020
In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2022

CVE-2016-6593

Publication date:
08/01/2020
A code-execution vulnerability exists during startup in jhi.dll and otpiha.dll in Symantec VIP Access Desktop before 2.2.2, which could let local malicious users execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2020

CVE-2014-2072

Publication date:
08/01/2020
Dassault Systemes Catia V5-6R2013: Stack Buffer Overflow due to inadequate boundary checks
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2020

CVE-2016-6589

Publication date:
08/01/2020
A Denial of Service vulnerability exists in the ITMS workflow process manager login window in Symantec IT Management Suite 8.0.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2020

CVE-2016-6590

Publication date:
08/01/2020
A privilege escalation vulnerability exists when loading DLLs during boot up and reboot in Symantec IT Management Suite 8.0 prior to 8.0 HF4 and Suite 7.6 prior to 7.6 HF7, Symantec Ghost Solution Suite 3.1 prior to 3.1 MP4, Symantec Endpoint Virtualization 7.x prior to 7.6 HF7, and Symantec Encryption Desktop 10.x prior to 10.4.1, which could let a local malicious user execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2020

CVE-2016-6591

Publication date:
08/01/2020
A security bypass vulnerability exists in Symantec Norton App Lock 1.0.3.186 and earlier if application pinning is enabled, which could let a local malicious user bypass security restrictions.
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2020

CVE-2014-1860

Publication date:
08/01/2020
Contao CMS through 3.2.4 has PHP Object Injection Vulnerabilities
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2020

CVE-2019-10778

Publication date:
08/01/2020
devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2020

CVE-2014-1409

Publication date:
08/01/2020
MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 have an authentication bypass vulnerability due to an XML file with obfuscated passwords
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2020

CVE-2019-20362

Publication date:
08/01/2020
In Teradici PCoIP Agent before 19.08.1 and PCoIP Client before 19.08.3, an unquoted service path can cause execution of %PROGRAMFILES(X86)%\Teradici\PCoIP.exe instead of the intended pcoip_vchan_printing_svc.exe file.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2020

CVE-2014-9908

Publication date:
08/01/2020
A Denial of Service vulnerability exists in Google Android 4.4.4, 5.0.2, and 5.1.1, which allows malicious users to block Bluetooh access (Android Bug ID A-28672558).
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2020