Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-19979

Publication date:
26/12/2019
A flaw in the WordPress plugin, WP Maintenance before 5.0.6, allowed attackers to enable a vulnerable site's maintenance mode and inject malicious code affecting site visitors. There was CSRF with resultant XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19980

Publication date:
26/12/2019
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a privilege bypass flaw that allowed authenticated users (Subscriber or greater access) to send test emails from the administrative dashboard on behalf of an administrator. This occurs because the plugin registers a wp_ajax function to send_test_email.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19981

Publication date:
26/12/2019
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed for CSRF to be exploited on all plugin settings.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19983

Publication date:
26/12/2019
In the WordPress plugin, Fast Velocity Minify before 2.7.7, the full web root path to the running WordPress application can be discovered. In order to exploit this vulnerability, FVM Debug Mode needs to be enabled and an admin-ajax request needs to call the fastvelocity_min_files action.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19984

Publication date:
26/12/2019
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed users with edit_post capabilities to manage plugin settings and email campaigns.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19977

Publication date:
26/12/2019
libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2020

CVE-2018-18288

Publication date:
26/12/2019
CrushFTP through 8.3.0 is vulnerable to credentials theft via URL redirection.
Severity CVSS v4.0: Pending analysis
Last modification:
22/12/2022

CVE-2019-19967

Publication date:
25/12/2019
The Administration page on Connect Box EuroDOCSIS 3.0 Voice Gateway CH7465LG-NCIP-6.12.18.25-2p6-NOSH devices accepts a cleartext password in a POST request on port 80, as demonstrated by the Password field to the xml/setter.xml URI.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2020

CVE-2019-19965

Publication date:
25/12/2019
In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2022

CVE-2019-19966

Publication date:
25/12/2019
In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.
Severity CVSS v4.0: Pending analysis
Last modification:
20/12/2022

CVE-2019-19962

Publication date:
25/12/2019
wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-19960

Publication date:
25/12/2019
In wolfSSL before 4.3.0, wc_ecc_mulmod_ex does not properly resist side-channel attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2020