Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-11845

Publication date:
14/05/2019
An HTML Injection vulnerability has been discovered on the RICOH SP 4510DN via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-9861

Publication date:
14/05/2019
Due to the use of an insecure RFID technology (MIFARE Classic), ABUS proximity chip keys (RFID tokens) of the ABUS Secvest FUAA50000 wireless alarm system can easily be cloned and used to deactivate the alarm system in an unauthorized way.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2019

CVE-2019-8923

Publication date:
14/05/2019
XAMPP through 5.6.8 and previous allows SQL injection via the cds-fpdf.php jahr parameter. NOTE: This product is discontinued.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2019

CVE-2019-8391

Publication date:
14/05/2019
qdPM 9.1 suffers from Cross-site Scripting (XSS) via configuration?type=[XSS] parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2019

CVE-2019-8404

Publication date:
14/05/2019
An issue was discovered in Webiness Inventory 2.3. The ProductModel component allows Arbitrary File Upload via a crafted product image during the creation of a new product. Consequently, an attacker can steal information from the site with the help of an installed executable file, or change the contents of pages.
Severity CVSS v4.0: Pending analysis
Last modification:
22/05/2019

CVE-2018-11691

Publication date:
14/05/2019
Emerson DeltaV Smart Switch Command Center application, available in versions 11.3.x and 12.3.1, was unable to change the DeltaV Smart Switches’ management password upon commissioning. Emerson released patches for DeltaV workstations to address this issue, and the patches can be downloaded from Emerson’s Guardian Support Portal. Please refer to the DeltaV Security Notification DSN19003 (KBA NK-1900-0808) for more information about this issue. DeltaV versions 13.3 and higher use the Network Device Command Center application to manage DeltaV Smart Switches, and this newer application is not impacted by this issue. After patching the Smart Switch Command Center, users are required to either commission the DeltaV Smart Switches or change password using the tool.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2020

CVE-2019-8390

Publication date:
14/05/2019
qdPM 9.1 suffers from Cross-site Scripting (XSS) in the search[keywords] parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2019

CVE-2018-18800

Publication date:
14/05/2019
The Tubigan "Welcome to our Resort" 1.0 software allows SQL Injection via index.php?p=accomodation&q=[SQL], index.php?p=rooms&q=[SQL], or admin/login.php.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2019

CVE-2019-6512

Publication date:
14/05/2019
An issue was discovered in WSO2 API Manager 2.6.0. It is possible to force the application to perform requests to the internal workstation (SSRF port-scanning), other adjacent workstations (SSRF network scanning), or to enumerate files because of the existence of the file:// wrapper.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2019-6514

Publication date:
14/05/2019
An issue was discovered in WSO2 Dashboard Server 2.0.0. It is possible to inject a JavaScript payload that will be stored in the database and then displayed and executed on the same page, aka XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2019-6515

Publication date:
14/05/2019
An issue was discovered in WSO2 API Manager 2.6.0. Uploaded documents for API documentation are available to an unauthenticated user.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2019-6516

Publication date:
14/05/2019
An issue was discovered in WSO2 Dashboard Server 2.0.0. It is possible to force the application to perform requests to the internal workstation (port-scanning) and to perform requests to adjacent workstations (network-scanning), aka SSRF.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025