Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-3652

Publication date:
09/10/2019
Code Injection vulnerability in EPSetup.exe in McAfee Endpoint Security (ENS) Prior to 10.6.1 October 2019 Update allows local user to get their malicious code installed by the ENS installer via code injection into EPSetup.exe by an attacker with access to the installer.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-3653

Publication date:
09/10/2019
Improper access control vulnerability in Configuration tool in McAfee Endpoint Security (ENS) Prior to 10.6.1 October 2019 Update allows local user to gain access to security configuration via unauthorized use of the configuration tool.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-6465

Publication date:
09/10/2019
Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2019

CVE-2019-6467

Publication date:
09/10/2019
A programming error in the nxdomain-redirect feature can cause an assertion failure in query.c if the alternate namespace used by nxdomain-redirect is a descendant of a zone that is served locally. The most likely scenario where this might occur is if the server, in addition to performing NXDOMAIN redirection for recursive clients, is also serving a local copy of the root zone or using mirroring to provide the root zone, although other configurations are also possible. Versions affected: BIND 9.12.0-> 9.12.4, 9.14.0. Also affects all releases in the 9.13 development branch.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2019

CVE-2019-6468

Publication date:
09/10/2019
In BIND Supported Preview Edition, an error in the nxdomain-redirect feature can occur in versions which support EDNS Client Subnet (ECS) features. In those versions which have ECS support, enabling nxdomain-redirect is likely to lead to BIND exiting due to assertion failure. Versions affected: BIND Supported Preview Edition version 9.10.5-S1 -> 9.11.5-S5. ONLY BIND Supported Preview Edition releases are affected.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2019

CVE-2019-17383

Publication date:
09/10/2019
The netaddr gem before 2.0.4 for Ruby has misconfigured file permissions, such that a gem install may result in 0777 permissions in the target filesystem.
Severity CVSS v4.0: Pending analysis
Last modification:
19/07/2022

CVE-2019-17124

Publication date:
09/10/2019
Kramer VIAware 2.5.0719.1034 has Incorrect Access Control.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2022

CVE-2019-17380

Publication date:
09/10/2019
cPanel before 82.0.15 allows self XSS in the WHM Update Preferences interface (SEC-528).
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-17376

Publication date:
09/10/2019
cPanel before 82.0.15 allows self XSS in the SSL Certificate Upload interface (SEC-521).
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-17377

Publication date:
09/10/2019
cPanel before 82.0.15 allows self XSS in LiveAPI example scripts (SEC-524).
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-17379

Publication date:
09/10/2019
cPanel before 82.0.15 allows self stored XSS in the WHM SSL Storage Manager interface (SEC-527).
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-17378

Publication date:
09/10/2019
cPanel before 82.0.15 allows self XSS in the SSL Key Delete interface (SEC-526).
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019