Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2015-9288

Publication date:
29/07/2019
The Unity Web Player plugin before 4.6.6f2 and 5.x before 5.0.3f2 allows attackers to read messages or access online services via a victim's credentials
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2019

CVE-2019-11201

Publication date:
29/07/2019
Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies the inclusion of dynamic content. Thus, a lower privileged user of the application can execute code under the context and permissions of the underlying web server.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2019

CVE-2019-11199

Publication date:
29/07/2019
Dolibarr ERP/CRM 9.0.1 was affected by stored XSS within uploaded files. These vulnerabilities allowed the execution of a JavaScript payload each time any regular user or administrative user clicked on the malicious link hosted on the same domain. The vulnerabilities could be exploited by low privileged users to target administrators. The viewimage.php page did not perform any contextual output encoding and would display the content within the uploaded file with a user-requested MIME type.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2019

CVE-2019-11200

Publication date:
29/07/2019
Dolibarr ERP/CRM 9.0.1 provides a web-based functionality that backs up the database content to a dump file. However, the application performs insufficient checks on the export parameters to mysqldump, which can lead to execution of arbitrary binaries on the server. (Malicious binaries can be uploaded by abusing other functionalities of the application.)
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2015-5601

Publication date:
29/07/2019
edx-platform before 2015-07-20 allows code execution by privileged users because the course import endpoint mishandles .tar.gz files.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2020

CVE-2019-1020007

Publication date:
29/07/2019
Dependency-Track before 3.5.1 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2020

CVE-2019-1020008

Publication date:
29/07/2019
stacktable.js before 1.0.4 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2019

CVE-2019-1020006

Publication date:
29/07/2019
invenio-app before 1.1.1 allows host header injection.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2019

CVE-2019-12613

Publication date:
29/07/2019
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn. Further investigation showed that it was not a security issue in customer-controlled software. Notes: recovery of a public key is not a security concern as per its public nature
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-1020009

Publication date:
29/07/2019
Fleet before 2.1.2 allows exposure of SMTP credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-13103

Publication date:
29/07/2019
A crafted self-referential DOS partition table will cause all Das U-Boot versions through 2019.07-rc4 to infinitely recurse, causing the stack to grow infinitely and eventually either crash or overwrite other data.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-1020004

Publication date:
29/07/2019
Tridactyl before 1.16.0 allows fake key events.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021