Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-13358

Publication date:
05/07/2019
lib/DocumentToText.php in OpenCats before 0.9.4-3 has XXE that allows remote users to read files on the underlying operating system. The attacker must upload a file in the docx or odt format.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2021

CVE-2019-12971

Publication date:
05/07/2019
BKS EBK Ethernet-Buskoppler Pro before 3.01 allows Unrestricted Upload of a File with a Dangerous Type.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2020

CVE-2019-13352

Publication date:
05/07/2019
WolfVision Cynap before 1.30j uses a static, hard-coded cryptographic secret for generating support PINs for the 'forgot password' feature. By knowing this static secret and the corresponding algorithm for calculating support PINs, an attacker can reset the ADMIN password and thus gain remote access.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2019

CVE-2018-16386

Publication date:
05/07/2019
An issue was discovered in SWIFT Alliance Web Platform 7.1.23. A log injection (and an arbitrary log filename) can be achieved via the PATH_INFO to swp/login/EJBRemoteService/, related to com.swift.ejbgwt.j2ee.client.EjBlnvocationException error log information containing null@java:comp/env/ error messages.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-13351

Publication date:
05/07/2019
posix/JackSocket.cpp in libjack in JACK2 1.9.1 through 1.9.12 (as distributed with alsa-plugins 1.1.7 and later) has a "double file descriptor close" issue during a failed connection attempt when jackd2 is not running. Exploitation success depends on multithreaded timing of that double close, which can result in unintended information disclosure, crashes, or file corruption due to having the wrong file associated with the file descriptor.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-14529

Publication date:
05/07/2019
Invoxia NVX220 devices allow access to /bin/sh via escape from a restricted CLI, leading to disclosure of password hashes.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2019

CVE-2018-14528

Publication date:
05/07/2019
Invoxia NVX220 devices allow TELNET access as admin with a default password.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2019

CVE-2018-14733

Publication date:
05/07/2019
The Odoo Community Association (OCA) dbfilter_from_header module makes Odoo 8.x, 9.x, 10.x, and 11.x vulnerable to ReDoS (regular expression denial of service) under certain circumstances.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2019

CVE-2018-12621

Publication date:
05/07/2019
An issue was discovered in Eventum 3.5.0. /htdocs/switch.php has an Open Redirect via the current_page parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2019

CVE-2018-14027

Publication date:
05/07/2019
Digisol Wireless Wifi Home Router HR-3300 allows XSS via the userid or password parameter to the admin login page.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2019

CVE-2019-13345

Publication date:
05/07/2019
The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-13344

Publication date:
05/07/2019
An authentication bypass vulnerability in the CRUDLab WP Like Button plugin through 1.6.0 for WordPress allows unauthenticated attackers to change settings. The contains() function in wp_like_button.php did not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update settings, as demonstrated by the wp-admin/admin.php?page=facebook-like-button each_page_url or code_snippet parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020