Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2013-2012

Publication date:
31/10/2019
autojump before 21.5.8 allows local users to gain privileges via a Trojan horse custom_install directory in the current working directory.
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2020

CVE-2013-2024

Publication date:
31/10/2019
OS command injection vulnerability in the "qs" procedure from the "utils" module in Chicken before 4.9.0.
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2020

CVE-2013-1951

Publication date:
31/10/2019
A cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.5 and 1.20.x before 1.20.4 and allows remote attackers to inject arbitrary web script or HTML via Lua function names.
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2020

CVE-2013-1945

Publication date:
31/10/2019
ruby193 uses an insecure LD_LIBRARY_PATH setting.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2019

CVE-2013-1934

Publication date:
31/10/2019
A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.0rc1 before 1.2.14 allows remote authenticated users to inject arbitrary web script or HTML via a complex value.
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2019

CVE-2013-1932

Publication date:
31/10/2019
A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.13 allows remote authenticated users to inject arbitrary web script or HTML via a project name.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2019

CVE-2013-1930

Publication date:
31/10/2019
MantisBT 1.2.12 before 1.2.15 allows authenticated users to by the workflow restriction and close issues.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2019

CVE-2013-1931

Publication date:
31/10/2019
A cross-site scripting (XSS) vulnerability in MantisBT 1.2.14 allows remote attackers to inject arbitrary web script or HTML via a version, related to deleting a version.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2019

CVE-2019-18657

Publication date:
31/10/2019
ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function.
Severity CVSS v4.0: Pending analysis
Last modification:
25/06/2025

CVE-2013-1910

Publication date:
31/10/2019
yum does not properly handle bad metadata, which allows an attacker to cause a denial of service and possibly have other unspecified impact via a Trojan horse file in the metadata of a remote repository.
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2020

CVE-2019-14356

Publication date:
31/10/2019
On Coldcard MK1 and MK2 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. On Coldcard MK1 and MK2 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: At Coinkite, we’ve already mitigated it, even though we feel strongly that it is not a legitimate issue. In our opinion, it is both unproven (might not even work) and also completely impractical—even if it could be made to work perfectly
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024

CVE-2019-12612

Publication date:
31/10/2019
An issue was discovered in Bitdefender BOX firmware versions before 2.1.37.37-34 that allows an attacker to pass arbitrary code to the BOX appliance via the web API. In order to exploit this vulnerability, an attacker needs presence in Bitdefender BOX setup network and Bitdefender BOX be in setup mode.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020