Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-17401

Publication date:
09/10/2019
libyal liblnk 20191006 has a heap-based buffer over-read in the network_share_name_offset>20 code block of liblnk_location_information_read_data in liblnk_location_information.c, a different issue than CVE-2019-17264. NOTE: the vendor has disputed this as described in the GitHub issue
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024

CVE-2019-5506

Publication date:
09/10/2019
Clustered Data ONTAP versions 9.0 and higher do not enforce hostname verification under certain circumstances making them susceptible to impersonation via man-in-the-middle attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2019

CVE-2019-5507

Publication date:
09/10/2019
SnapManager for Oracle prior to version 3.4.2P1 are susceptible to a vulnerability which when successfully exploited could lead to disclosure of sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-17092

Publication date:
09/10/2019
An XSS vulnerability in project list in OpenProject before 9.0.4 and 10.x before 10.0.2 allows remote attackers to inject arbitrary web script or HTML via the sortBy parameter because error messages are mishandled.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-17399

Publication date:
09/10/2019
The Shack Forms Pro extension before 4.0.32 for Joomla! allows path traversal via a file attachment.
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2019

CVE-2019-17389

Publication date:
09/10/2019
In RIOT 2019.07, the MQTT-SN implementation (asymcute) mishandles errors occurring during a read operation on a UDP socket. The receive loop ends. This allows an attacker (via a large packet) to prevent a RIOT MQTT-SN client from working until the device is restarted.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-6469

Publication date:
09/10/2019
An error in the EDNS Client Subnet (ECS) feature for recursive resolvers can cause BIND to exit with an assertion failure when processing a response that has malformed RRSIGs. Versions affected: BIND 9.10.5-S1 -> 9.11.6-S1 of BIND 9 Supported Preview Edition.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-6471

Publication date:
09/10/2019
A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -> 9.11.7-S1.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-4512

Publication date:
09/10/2019
IBM Maximo Asset Management 7.6.1.1 generates an error message that includes sensitive information that could be used in further attacks against the system. IBM X-Force ID: 164554.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-4558

Publication date:
09/10/2019
A security vulnerability has been identified in all levels of IBM Spectrum Scale V5.0.0.0 through V5.0.3.2 and IBM Spectrum Scale V4.2.0.0 through V4.2.3.17 that could allow a local attacker to obtain root privilege by injecting parameters into setuid files.
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2019

CVE-2019-3652

Publication date:
09/10/2019
Code Injection vulnerability in EPSetup.exe in McAfee Endpoint Security (ENS) Prior to 10.6.1 October 2019 Update allows local user to get their malicious code installed by the ENS installer via code injection into EPSetup.exe by an attacker with access to the installer.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-3653

Publication date:
09/10/2019
Improper access control vulnerability in Configuration tool in McAfee Endpoint Security (ENS) Prior to 10.6.1 October 2019 Update allows local user to gain access to security configuration via unauthorized use of the configuration tool.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023