Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-15071

Publication date:
20/11/2019
The "/cgi-bin/go" page in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via ACTION parameter without authentication. The code can executed for any user accessing the page. This vulnerability affects many mail system of governments, organizations, companies and universities.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2019

CVE-2019-6184

Publication date:
20/11/2019
A potential vulnerability in the discontinued Customer Engagement Service (CCSDK) software version 2.0.21.1 may allow local privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-6187

Publication date:
20/11/2019
A stored CSV Injection vulnerability was reported in Lenovo XClarity Controller (XCC) that could allow an administrative or other appropriately permissioned user to store malformed data in certain XCC server informational fields, that could result in crafted formulas being stored in an exported CSV file. The crafted formula is not executed on XCC itself and has no effect on the server.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-6191

Publication date:
20/11/2019
A potential vulnerability in the discontinued LenovoPaper software version 1.0.0.22 may allow local privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-6176

Publication date:
20/11/2019
A potential vulnerability reported in ThinkPad USB-C Dock Firmware version 3.7.2 may allow a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2019

CVE-2019-6189

Publication date:
20/11/2019
A potential vulnerability was reported in Lenovo System Interface Foundation versions before v1.1.18.3 that could allow an administrative user to load an unsigned DLL.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2019

CVE-2019-6186

Publication date:
20/11/2019
A potential vulnerability was reported in Lenovo System Interface Foundation versions before v1.1.18.3 that could allow an authenticated user to execute code as another user.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2019

CVE-2011-3350

Publication date:
19/11/2019
masqmail 0.2.21 through 0.2.30 improperly calls seteuid() in src/log.c and src/masqmail.c that results in improper privilege dropping.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2011-3352

Publication date:
19/11/2019
Zikula 1.3.0 build #3168 and probably prior has XSS flaw due to improper sanitization of the 'themename' parameter by setting default, modifying and deleting themes. A remote attacker with Zikula administrator privilege could use this flaw to execute arbitrary HTML or web script code in the context of the affected website.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2019-10083

Publication date:
19/11/2019
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-12421

Publication date:
19/11/2019
When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-19126

Publication date:
19/11/2019
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023