Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-19940

Publication date:
16/03/2020
Incorrect input sanitation in text-oriented user interfaces (telnet, ssh) in Swisscom Centro Grande before 6.16.12 allows remote authenticated users to execute arbitrary commands via command injection.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2021

CVE-2019-19942

Publication date:
16/03/2020
Missing output sanitation in Swisscom Centro Grande Centro Grande before 6.16.12, Centro Business 1.0 (ADB) before 7.10.18, and Centro Business 2.0 before 8.02.04 allows a remote attacker to perform DNS spoofing against the web interface via crafted hostnames in DHCP requests.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2021

CVE-2019-4656

Publication date:
16/03/2020
IBM MQ and IBM MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD is vulnerable to a denial of service attack that would allow an authenticated user to crash the queue and require a restart due to an error processing error messages. IBM X-Force ID: 170967.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-4619

Publication date:
16/03/2020
IBM MQ and IBM MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace. IBM X-Force ID: 168862.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-4719

Publication date:
16/03/2020
IBM MQ and IBM MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD could allow a local attacker to obtain sensitive information by inclusion of sensitive data within runmqras data.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19135

Publication date:
16/03/2020
In OPC Foundation OPC UA .NET Standard codebase 1.4.357.28, servers do not create sufficiently random numbers in OPCFoundation.NetStandard.Opc.Ua before 1.4.359.31, which allows man in the middle attackers to reuse encrypted user credentials sent over the network.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-1753

Publication date:
16/03/2020
A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-19208

Publication date:
16/03/2020
Codiad Web IDE through 2.8.4 allows PHP Code injection.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2019-14887

Publication date:
16/03/2020
A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable.
Severity CVSS v4.0: Pending analysis
Last modification:
02/11/2021

CVE-2019-19211

Publication date:
16/03/2020
Dolibarr ERP/CRM before 10.0.3 has an Insufficient Filtering issue that can lead to user/card.php XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2020

CVE-2019-19210

Publication date:
16/03/2020
Dolibarr ERP/CRM before 10.0.3 allows XSS because uploaded HTML documents are served as text/html despite being renamed to .noexe files.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2020

CVE-2019-19209

Publication date:
16/03/2020
Dolibarr ERP/CRM before 10.0.3 allows SQL Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2020