Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-19916

Publication date:
20/12/2019
In Midori Browser 0.5.11 (on Windows 10), Content Security Policy (CSP) is not applied correctly to all parts of multipart content sent with the multipart/x-mixed-replace MIME type. This could result in script running where CSP should have blocked it, allowing for cross-site scripting (XSS) and other attacks when the product renders the content as HTML. Remediating this would also need to consider the polyglot case, e.g., a file that is a valid GIF image and also valid JavaScript.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2020

CVE-2019-19692

Publication date:
20/12/2019
Trend Micro Apex One (2019) is affected by a cross-site scripting (XSS) vulnerability on the product console. Note that the Japanese version of the product is NOT affected.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2020

CVE-2019-19693

Publication date:
20/12/2019
The Trend Micro Security 2020 consumer family of products contains a vulnerability that could allow a local attacker to disclose sensitive information or to create a denial-of-service condition on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-18263

Publication date:
20/12/2019
An issue was found in Philips Veradius Unity, Pulsera, and Endura Dual WAN Router, Veradius Unity (718132) with wireless option (shipped between 2016-August 2018), Veradius Unity (718132) with ViewForum option (shipped between 2016-August 2018), Pulsera (718095) and Endura (718075) with wireless option (shipped between 26-June-2017 through 07-August 2018), Pulsera (718095) and Endura (718075) with ViewForum option (shipped between 26-June-2017 through 07-August 2018). The router software uses an encryption scheme that is not strong enough for the level of protection required.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2020

CVE-2019-17440

Publication date:
20/12/2019
Improper restriction of communications to Log Forwarding Card (LFC) on PA-7000 Series devices with second-generation Switch Management Card (SMC) may allow an attacker with network access to the LFC to gain root access to PAN-OS. This issue affects PAN-OS 9.0 versions prior to 9.0.5-h3 on PA-7080 and PA-7050 devices with an LFC installed and configured. This issue does not affect PA-7000 Series deployments using the first-generation SMC and the Log Processing Card (LPC). This issue does not affect any other PA series devices. This issue does not affect devices without an LFC. This issue does not affect PAN-OS 8.1 or prior releases. This issue only affected a very limited number of customers and we undertook individual outreach to help them upgrade. At the time of publication, all identified customers have upgraded SW or content and are not impacted.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2020

CVE-2019-19691

Publication date:
20/12/2019
A vulnerability in Trend Micro Apex One and OfficeScan XG could allow an attacker to expose a masked credential key by manipulating page elements using development tools. Note that the attacker must already have admin/root privileges on the product console to exploit this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2012-6111

Publication date:
20/12/2019
gnome-keyring does not discard stored secrets when using gnome_keyring_lock_all_sync function
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2020

CVE-2012-6094

Publication date:
20/12/2019
cups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could provide unauthorized access to the system
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2020

CVE-2015-8313

Publication date:
20/12/2019
GnuTLS incorrectly validates the first byte of padding in CBC modes
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2020

CVE-2012-3409

Publication date:
20/12/2019
ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2016-1000229

Publication date:
20/12/2019
swagger-ui has XSS in key names
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2019

CVE-2012-5639

Publication date:
20/12/2019
LibreOffice and OpenOffice automatically open embedded content
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2024