Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-19999

Publication date:
26/12/2019
Halo before 1.2.0-beta.1 allows Server Side Template Injection (SSTI) because TemplateClassResolver.SAFER_RESOLVER is not used in the FreeMarker configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2020

CVE-2019-19982

Publication date:
26/12/2019
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed for unauthenticated option creation. In order to exploit this vulnerability, an attacker would need to send a /wp-admin/admin-post.php?es_skip=1&option_name= request.
Severity CVSS v4.0: Pending analysis
Last modification:
30/12/2019

CVE-2019-19985

Publication date:
26/12/2019
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
26/04/2022

CVE-2019-19979

Publication date:
26/12/2019
A flaw in the WordPress plugin, WP Maintenance before 5.0.6, allowed attackers to enable a vulnerable site's maintenance mode and inject malicious code affecting site visitors. There was CSRF with resultant XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19980

Publication date:
26/12/2019
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a privilege bypass flaw that allowed authenticated users (Subscriber or greater access) to send test emails from the administrative dashboard on behalf of an administrator. This occurs because the plugin registers a wp_ajax function to send_test_email.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19981

Publication date:
26/12/2019
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed for CSRF to be exploited on all plugin settings.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19983

Publication date:
26/12/2019
In the WordPress plugin, Fast Velocity Minify before 2.7.7, the full web root path to the running WordPress application can be discovered. In order to exploit this vulnerability, FVM Debug Mode needs to be enabled and an admin-ajax request needs to call the fastvelocity_min_files action.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19984

Publication date:
26/12/2019
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed users with edit_post capabilities to manage plugin settings and email campaigns.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-19977

Publication date:
26/12/2019
libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2020

CVE-2018-18288

Publication date:
26/12/2019
CrushFTP through 8.3.0 is vulnerable to credentials theft via URL redirection.
Severity CVSS v4.0: Pending analysis
Last modification:
22/12/2022

CVE-2019-19967

Publication date:
25/12/2019
The Administration page on Connect Box EuroDOCSIS 3.0 Voice Gateway CH7465LG-NCIP-6.12.18.25-2p6-NOSH devices accepts a cleartext password in a POST request on port 80, as demonstrated by the Password field to the xml/setter.xml URI.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2020

CVE-2019-19965

Publication date:
25/12/2019
In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2022