Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-18665

Publication date:
02/11/2019
The Log module in SECUDOS DOMOS before 5.6 allows local file inclusion.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2019

CVE-2019-18662

Publication date:
02/11/2019
An issue was discovered in YouPHPTube through 7.7. User input passed through the live_stream_code POST parameter to /plugin/LiveChat/getChat.json.php is not properly sanitized (in getFromChat in plugin/LiveChat/Objects/LiveChatObj.php) before being used to construct a SQL query. This can be exploited by malicious users to, e.g., read sensitive data from the database through in-band SQL Injection attacks. Successful exploitation of this vulnerability requires the Live Chat plugin to be enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2019

CVE-2019-18661

Publication date:
02/11/2019
Fastweb FASTGate 1.0.1b devices allow partial authentication bypass by changing a certain check_pwd return value from 0 to 1. An attack does not achieve administrative control of a device; however, the attacker can view all of the web pages of the administration console.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-18659

Publication date:
02/11/2019
The Wireless Emergency Alerts (WEA) protocol allows remote attackers to spoof a Presidential Alert because cryptographic authentication is not used, as demonstrated by MessageIdentifier 4370 in LTE System Information Block 12 (aka SIB12). NOTE: testing inside an RF-isolated shield box suggested that all LTE phones are affected by design (e.g., use of Android versus iOS does not matter); testing in an open RF environment is, of course, contraindicated.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-6470

Publication date:
01/11/2019
There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2005-2352

Publication date:
01/11/2019
I race condition in Temp files was found in gs-gpl before 8.56 addons scripts.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2024

CVE-2013-4168

Publication date:
01/11/2019
Cross-site scripting (XSS) vulnerability in SmokePing 2.6.9 in the start and end time fields.
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2020

CVE-2019-18653

Publication date:
01/11/2019
A Cross Site Scripting (XSS) issue exists in Avast AntiVirus (Free, Internet Security, and Premiere Edition) 19.3.2369 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-18654

Publication date:
01/11/2019
A Cross Site Scripting (XSS) issue exists in AVG AntiVirus (Internet Security Edition) 19.3.3084 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2005-2351

Publication date:
01/11/2019
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2024

CVE-2013-0180

Publication date:
01/11/2019
Insecure temporary file vulnerability in Redis 2.6 related to /tmp/redis.ds.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2019

CVE-2013-0178

Publication date:
01/11/2019
Insecure temporary file vulnerability in Redis before 2.6 related to /tmp/redis-%p.vm.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2019