Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-2113

Publication date:
08/07/2019
In setup wizard there is a bypass of some checks when wifi connection is skipped. This could lead to factory reset protection bypass with no additional privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-122597079.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-10973

Publication date:
08/07/2019
Quest KACE, all versions prior to version 8.0.x, 8.1.x, and 9.0.x, allows unintentional access to the appliance leveraging functions of the troubleshooting tools located in the administrator user interface.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-13413

Publication date:
08/07/2019
The Rencontre plugin before 3.1.3 for WordPress allows SQL Injection via inc/rencontre_widget.php.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2023

CVE-2019-13414

Publication date:
08/07/2019
The Rencontre plugin before 3.1.3 for WordPress allows XSS via inc/rencontre_widget.php.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2023

CVE-2019-13354

Publication date:
08/07/2019
The strong_password gem 0.0.7 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 0.0.6.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2019

CVE-2019-12174

Publication date:
08/07/2019
hide.me before 2.4.4 on macOS suffers from a privilege escalation vulnerability in the connectWithExecutablePath:configFilePath:configFileName method of the me_hide_vpnhelper.Helper class in the me.hide.vpnhelper macOS privilege helper tool. This method takes user-supplied input and can be used to escalate privileges, as well as obtain the ability to run any application on the system in the root context.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-11563

Publication date:
08/07/2019
An issue was discovered in Open Ticket Request System (OTRS) 6.0.x through 6.0.7. A carefully constructed email could be used to inject and execute arbitrary stylesheet or JavaScript code in a logged in customer's browser in the context of the OTRS customer panel application.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2023

CVE-2019-12171

Publication date:
08/07/2019
Dropbox.exe (and QtWebEngineProcess.exe in the Web Helper) in the Dropbox desktop application 71.4.108.0 store cleartext credentials in memory upon successful login or new account creation. These are not securely freed in the running process.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-13401

Publication date:
08/07/2019
Dynacolor FCM-MB40 v1.2.0.0 devices have CSRF in all scripts under cgi-bin/.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2019

CVE-2019-13400

Publication date:
08/07/2019
Dynacolor FCM-MB40 v1.2.0.0 use /etc/appWeb/appweb.pass to store administrative web-interface credentials in cleartext. These credentials can be retrieved via cgi-bin/getuserinfo.cgi?mode=info.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-13402

Publication date:
08/07/2019
/usr/sbin/default.sh and /usr/apache/htdocs/cgi-bin/admin/hardfactorydefault.cgi on Dynacolor FCM-MB40 v1.2.0.0 devices implement an incomplete factory-reset process. A backdoor can persist because neither system accounts nor the set of services is reset.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-13404

Publication date:
08/07/2019
The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024