Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-17219

Publication date:
06/10/2019
An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. By default, the device does not enforce any authentication. An adjacent attacker is able to use the network interface without proper access control.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-17213

Publication date:
06/10/2019
The WebARX plugin 1.3.0 for WordPress has unauthenticated stored XSS via the URI or the X-Forwarded-For HTTP header.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2019

CVE-2019-17214

Publication date:
06/10/2019
The WebARX plugin 1.3.0 for WordPress allows firewall bypass by appending &cc=1 to a URI.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-17206

Publication date:
05/10/2019
Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2019

CVE-2019-17205

Publication date:
05/10/2019
TeamPass 2.1.27.36 allows Stored XSS by placing a payload in the username field during a login attempt. When an administrator looks at the log of failed logins, the XSS payload will be executed.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2019

CVE-2019-17204

Publication date:
05/10/2019
TeamPass 2.1.27.36 allows Stored XSS by setting a crafted Knowledge Base label and adding any available item.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2019

CVE-2019-17203

Publication date:
05/10/2019
TeamPass 2.1.27.36 allows Stored XSS at the Search page by setting a crafted password for an item in any folder.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2019

CVE-2019-17199

Publication date:
05/10/2019
www/getfile.php in WPO WebPageTest 19.04 on Windows allows Directory Traversal (for reading arbitrary files) because of an unanchored regular expression, as demonstrated by the a.jpg\.. substring.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2019

CVE-2019-13145

Publication date:
05/10/2019
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-17197

Publication date:
05/10/2019
OpenEMR through 5.0.2 has SQL Injection in the Lifestyle demographic filter criteria in library/clinical_rules.php that affects library/patient.inc.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2019

CVE-2019-17191

Publication date:
05/10/2019
The Signal Private Messenger application before 4.47.7 for Android allows a caller to force a call to be answered, without callee user interaction, via a connect message. The existence of the call is noticeable to the callee; however, the audio channel may be open before the callee can block eavesdropping.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-17192

Publication date:
05/10/2019
The WebRTC component in the Signal Private Messenger application through 4.47.7 for Android processes videoconferencing RTP packets before a callee chooses to answer a call, which might make it easier for remote attackers to cause a denial of service or possibly have unspecified other impact via malformed packets. NOTE: the vendor plans to continue this behavior for performance reasons unless a WebRTC design change occurs
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024