Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-4546

Publication date:
29/10/2019
After installing the IBM Maximo Health- Safety and Environment Manager 7.6.1, a user is granted additional privileges that they are not normally allowed to access. IBM X-Force ID: 165948.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2019

CVE-2019-4307

Publication date:
29/10/2019
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 160987.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2019-4309

Publication date:
29/10/2019
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 uses hard coded credentials which could allow a local user to obtain highly sensitive information. IBM X-Force ID: 161035.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2019-4311

Publication date:
29/10/2019
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 161037.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2022

CVE-2019-4314

Publication date:
29/10/2019
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 stores sensitive information in cleartext within a resource that might be accessible to another control sphere. IBM X-Force ID: 1610141.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2022

CVE-2019-4330

Publication date:
29/10/2019
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 does not set the secure attribute for cookies in HTTPS sessions, which could cause the user agent to send those cookies in plaintext over an HTTP session. IBM X-Force ID: 161210.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2022

CVE-2019-4339

Publication date:
29/10/2019
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 161418.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2022

CVE-2019-4306

Publication date:
29/10/2019
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 specifies permissions for a security-critical resource which could lead to the exposure of sensitive information or the modification of that resource by unintended parties. IBM X-Force ID: 160986.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2019-18189

Publication date:
28/10/2019
A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (11.0, XG) and Worry-Free Business Security (9.5, 10.0) may allow an attacker to bypass authentication and log on to an affected product's management console as a root user. The vulnerability does not require authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2019

CVE-2019-18188

Publication date:
28/10/2019
Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-18187

Publication date:
28/10/2019
Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025

CVE-2017-15725

Publication date:
28/10/2019
An XML External Entity Injection vulnerability exists in Dzone AnswerHub.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2019