Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-12198

Publication date:
20/05/2019
In GoHttp through 2017-07-25, there is a stack-based buffer over-read via a long User-Agent header.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2019

CVE-2019-12185

Publication date:
20/05/2019
eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024

CVE-2019-12184

Publication date:
19/05/2019
There is XSS in browser/components/MarkdownPreview.js in BoostIO Boostnote 0.11.15 via a label named flowchart, sequence, gallery, or chart, as demonstrated by a crafted SRC attribute of an IFRAME element, a different vulnerability than CVE-2019-12136.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2019

CVE-2019-12173

Publication date:
18/05/2019
MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-12172

Publication date:
17/05/2019
Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-12170

Publication date:
17/05/2019
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024

CVE-2019-12168

Publication date:
17/05/2019
Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-12163

Publication date:
17/05/2019
GAT-Ship Web Module through 1.30 allows remote attackers to obtain potentially sensitive information via {} in a ws/gatshipWs.asmx/SqlVersion request.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2023

CVE-2019-11644

Publication date:
17/05/2019
In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. The installer writes the file rm.exe to C:\Windows\Temp and then executes it. The rm.exe process then attempts to load several DLLs from its current directory. Non-admin users are able to write to this folder, so an attacker can create a malicious C:\Windows\Temp\OLEACC.dll file. When an admin runs the installer, rm.exe will execute the attacker's DLL in an elevated security context.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-8339

Publication date:
17/05/2019
An issue was discovered in Falco through 0.14.0. A missing indicator for insufficient resources allows local users to bypass the detection engine.
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2019

CVE-2019-12161

Publication date:
17/05/2019
WPO WebPageTest 19.04 allows SSRF because ValidateURL in www/runtest.php does not consider octal encoding of IP addresses (such as 0300.0250 as a replacement for 192.168).
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2019

CVE-2019-12159

Publication date:
17/05/2019
GoHTTP through 2017-07-25 has a stack-based buffer over-read in the scan function (when called from getRequestType) via a long URL.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2019