Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-5498

Publication date:
09/08/2019
OnCommand Insight versions through 7.3.6 may disclose sensitive account information to an authenticated user.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-12256

Publication date:
09/08/2019
Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the IPv4 component. There is an IPNET security vulnerability: Stack overflow in the parsing of IPv4 packets’ IP options.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2022

CVE-2019-12257

Publication date:
09/08/2019
Wind River VxWorks 6.6 through 6.9 has a Buffer Overflow in the DHCP client component. There is an IPNET security vulnerability: Heap overflow in DHCP Offer/ACK parsing inside ipdhcpc.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2022

CVE-2019-5398

Publication date:
09/08/2019
A remote multiple multiple cross-site vulnerability was discovered in HPE 3PAR Service Processor version(s): prior to 5.0.5.1.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2019

CVE-2019-5397

Publication date:
09/08/2019
A remote bypass of security restrictions vulnerability was discovered in HPE 3PAR Service Processor version(s): prior to 5.0.5.1.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-5399

Publication date:
09/08/2019
A remote gain authorized access vulnerability was discovered in HPE 3PAR Service Processor version(s): prior to 5.0.5.1.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-12805

Publication date:
09/08/2019
NCSOFT Game Launcher, NC Launcher2 2.4.1.691 and earlier versions have a vulnerability in the custom protocol handler that could allow remote attacker to execute arbitrary command. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page. This can be leveraged for code execution in the context of the current user.
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2023

CVE-2019-5395

Publication date:
09/08/2019
A remote arbitrary file upload vulnerability was discovered in HPE 3PAR Service Processor version(s): prior to 5.0.5.1.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2019

CVE-2019-5396

Publication date:
09/08/2019
A remote authentication bypass vulnerability was discovered in HPE 3PAR Service Processor version(s): prior to 5.0.5.1.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2017-18486

Publication date:
09/08/2019
Jitbit Helpdesk before 9.0.3 allows remote attackers to escalate privileges because of mishandling of the User/AutoLogin userHash parameter. By inspecting the token value provided in a password reset link, a user can leverage a weak PRNG to recover the shared secret used by the server for remote authentication. The shared secret can be used to escalate privileges by forging new tokens for any user. These tokens can be used to automatically log in as the affected user.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2019

CVE-2018-20858

Publication date:
09/08/2019
Recommender before 2018-07-18 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-14806

Publication date:
09/08/2019
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2023