Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-7003

Publication date:
11/07/2019
A SQL injection vulnerability in the reporting component of Avaya Control Manager could allow an unauthenticated attacker to execute arbitrary SQL commands and retrieve sensitive data related to other users on the system. Affected versions of Avaya Control Manager include 7.x and 8.0.x versions prior to 8.0.4.0. Unsupported versions not listed here were not evaluated.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2019-3854

Publication date:
11/07/2019
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-13029

Publication date:
11/07/2019
Multiple stored Cross-site scripting (XSS) issues in the admin panel and survey system in REDCap 8 before 8.10.20 and 9 before 9.1.2 allow an attacker to inject arbitrary malicious HTML or JavaScript code into a user's web browser.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2025

CVE-2019-9657

Publication date:
11/07/2019
Alarm.com ADC-V522IR 0100b9 devices have Incorrect Access Control, a different issue than CVE-2018-19588. This occurs because of incorrect protection of VPN certificates (used for initiating a VPN session to the Alarm.com infrastructure) on the local camera device.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-3889

Publication date:
11/07/2019
A reflected XSS vulnerability exists in authorization flow of OpenShift Container Platform versions: openshift-online-3, openshift-enterprise-3.4 through 3.7 and openshift-enterprise-3.9 through 3.11. An attacker could use this flaw to steal authorization data by getting them to click on a malicious link.
Severity CVSS v4.0: Pending analysis
Last modification:
01/03/2023

CVE-2019-10192

Publication date:
11/07/2019
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2021

CVE-2019-10193

Publication date:
11/07/2019
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2021

CVE-2019-10135

Publication date:
11/07/2019
A flaw was found in the yaml.load() function in the osbs-client versions since 0.46 before 0.56.1. Insecure use of the yaml.load() function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2022

CVE-2019-11062

Publication date:
11/07/2019
The SUNNET WMPro v5.0 and v5.1 for eLearning system has OS Command Injection via "/teach/course/doajaxfileupload.php". The target server can be exploited without authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
01/03/2023

CVE-2018-17150

Publication date:
11/07/2019
Intersystems Cache 2017.2.2.865.0 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2019

CVE-2018-17151

Publication date:
11/07/2019
Intersystems Cache 2017.2.2.865.0 has Incorrect Access Control.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2019

CVE-2018-17152

Publication date:
11/07/2019
Intersystems Cache 2017.2.2.865.0 allows XXE.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2019