Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-7273

Publication date:
01/07/2019
Optergy Proton/Enterprise devices allow Cross-Site Request Forgery (CSRF).
Severity CVSS v4.0: Pending analysis
Last modification:
13/10/2022

CVE-2019-7274

Publication date:
01/07/2019
Optergy Proton/Enterprise devices allow Authenticated File Upload with Code Execution as root.
Severity CVSS v4.0: Pending analysis
Last modification:
13/10/2022

CVE-2019-10979

Publication date:
01/07/2019
SICK MSC800 all versions prior to Version 4.0, the affected firmware versions contain a hard-coded customer account password.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2019

CVE-2019-7278

Publication date:
01/07/2019
Optergy Proton/Enterprise devices have an Unauthenticated SMS Sending Service.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-7277

Publication date:
01/07/2019
Optergy Proton/Enterprise devices allow Unauthenticated Internal Network Information Disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-7276

Publication date:
01/07/2019
Optergy Proton/Enterprise devices allow Remote Root Code Execution via a Backdoor Console.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2023

CVE-2019-13133

Publication date:
01/07/2019
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
Severity CVSS v4.0: Pending analysis
Last modification:
02/06/2021

CVE-2019-13134

Publication date:
01/07/2019
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
Severity CVSS v4.0: Pending analysis
Last modification:
02/06/2021

CVE-2019-13135

Publication date:
01/07/2019
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-13137

Publication date:
01/07/2019
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2021

CVE-2019-13136

Publication date:
01/07/2019
ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-3962

Publication date:
01/07/2019
Content Injection vulnerability in Tenable Nessus prior to 8.5.0 may allow an authenticated, local attacker to exploit this vulnerability by convincing another targeted Nessus user to view a malicious URL and use Nessus to send fraudulent messages. Successful exploitation could allow the authenticated adversary to inject arbitrary text into the feed status, which will remain saved post session expiration.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020