Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-12871

Publication date:
24/06/2019
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2019

CVE-2019-12938

Publication date:
24/06/2019
The Roundcube component of Analogic Poste.io 2.1.6 uses .htaccess to protect the logs/ folder, which is effective with the Apache HTTP Server but is ineffective with nginx. Attackers can read logs via the webmail/logs/sendmail URI.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2019

CVE-2019-12928

Publication date:
24/06/2019
The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024

CVE-2019-12929

Publication date:
24/06/2019
The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024

CVE-2019-12937

Publication date:
23/06/2019
apps/gsudo.c in gsudo in ToaruOS through 1.10.9 has a buffer overflow allowing local privilege escalation to the root user via the DISPLAY environment variable.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2022

CVE-2019-12936

Publication date:
23/06/2019
BlueStacks App Player 2, 3, and 4 before 4.90 allows DNS Rebinding for attacks on exposed IPC functions.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-12935

Publication date:
23/06/2019
Shopware before 5.5.8 has XSS via the Query String to the backend/Login or backend/Login/load/ URI.
Severity CVSS v4.0: Pending analysis
Last modification:
25/06/2019

CVE-2019-12933

Publication date:
22/06/2019
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-11877. Reason: This candidate is a duplicate of CVE-2019-11877. Notes: All CVE users should reference CVE-2019-11877 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-10028

Publication date:
21/06/2019
Denial of Service (DOS) in Dial Reference Source Code Used before June 18th, 2019.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-11392

Publication date:
21/06/2019
BlogEngine.NET 3.3.7 and earlier allows XXE via an apml file to syndication.axd.
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2019

CVE-2019-10718

Publication date:
21/06/2019
BlogEngine.NET 3.3.7.0 and earlier allows XML External Entity Blind Injection, related to pingback.axd and BlogEngine.Core/Web/HttpHandlers/PingbackHandler.cs.
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2019

CVE-2019-10719

Publication date:
21/06/2019
BlogEngine.NET 3.3.7.0 and earlier allows Directory Traversal and Remote Code Execution because file creation is mishandled, related to /api/upload and BlogEngine.NET/AppCode/Api/UploadController.cs. NOTE: this issue exists because of an incomplete fix for CVE-2019-6714.
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2019