Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-9449

Publication date:
28/02/2020
An insecure random number generation vulnerability in BlaB! AX, BlaB! AX Pro, BlaB! WS (client), and BlaB! WS Pro (client) version 19.11 allows an attacker (with a guest or user session cookie) to escalate privileges by retrieving the cookie salt value and creating a valid session cookie for an arbitrary user or admin.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2020

CVE-2019-10805

Publication date:
28/02/2020
valib through 2.0.0 allows Internal Property Tampering. A maliciously crafted JavaScript object can bypass several inspection functions provided by valib. Valib uses a built-in function (hasOwnProperty) from the unsafe user-input to examine an object. It is possible for a crafted payload to overwrite this function to manipulate the inspection results to bypass security checks.
Severity CVSS v4.0: Pending analysis
Last modification:
05/03/2020

CVE-2019-10803

Publication date:
28/02/2020
push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable "opt.branch" is not validated before being provided to the "git" command within "index.js#L139". This could be abused by an attacker to inject arbitrary commands.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2020

CVE-2020-9459

Publication date:
28/02/2020
Multiple Stored Cross-site scripting (XSS) vulnerabilities in the Webnus Modern Events Calendar Lite plugin through 5.1.6 for WordPress allows remote authenticated users (with minimal permissions) to inject arbitrary JavaScript, HTML, or CSS via Ajax actions. This affects mec_save_notifications and import_settings.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2020

CVE-2019-10804

Publication date:
28/02/2020
serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-10802

Publication date:
28/02/2020
giting version prior to 0.0.8 allows execution of arbritary commands. The first argument "repo" of function "pull()" is executed by the package without any validation.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2020

CVE-2018-21035

Publication date:
28/02/2020
In Qt through 5.14.1, the WebSocket implementation accepts up to 2GB for frames and 2GB for messages. Smaller limits cannot be configured. This makes it easier for attackers to cause a denial of service (memory consumption).
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-10801

Publication date:
28/02/2020
enpeem through 2.2.0 allows execution of arbitrary commands. The "options.dir" argument is provided to the "exec" function without any sanitization.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2020-8127

Publication date:
28/02/2020
Insufficient validation in cross-origin communication (postMessage) in reveal.js version 3.9.1 and earlier allow attackers to perform cross-site scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2020

CVE-2020-9465

Publication date:
28/02/2020
An issue was discovered in EyesOfNetwork eonweb 5.1 through 5.3 before 5.3-3. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the user_id field in a cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2021

CVE-2019-19943

Publication date:
28/02/2020
The HTTP service in quickweb.exe in Pablo Quick 'n Easy Web Server 3.3.8 allows Remote Unauthenticated Heap Memory Corruption via a large host or domain parameter. It may be possible to achieve remote code execution because of a double free.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-15609

Publication date:
28/02/2020
The kill-port-process package version
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2020