Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-11353

Publication date:
09/05/2019
The EnGenius EWS660AP router with firmware 2.0.284 allows an attacker to execute arbitrary commands using the built-in ping and traceroute utilities by using different payloads and injecting multiple parameters. This vulnerability is fixed in a later firmware version.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-9847

Publication date:
09/05/2019
A vulnerability in LibreOffice hyperlink processing allows an attacker to construct documents containing hyperlinks pointing to the location of an executable on the target users file system. If the hyperlink is activated by the victim the executable target is unconditionally launched. Under Windows and macOS when processing a hyperlink target explicitly activated by the user there was no judgment made on whether the target was an executable file, so such executable targets were launched unconditionally. This issue affects: All LibreOffice Windows and macOS versions prior to 6.1.6; LibreOffice Windows and macOS versions in the 6.2 series prior to 6.2.3.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2021

CVE-2019-11836

Publication date:
09/05/2019
The Rediffmail (aka com.rediff.mail.and) application 2.2.6 for Android has cleartext mail content in file storage, persisting after a logout.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-11820

Publication date:
09/05/2019
Information exposure through process environment vulnerability in Synology Calendar before 2.3.3-0620 allows local users to obtain credentials via cmdline.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2021

CVE-2019-11834

Publication date:
09/05/2019
cJSON before 1.7.11 allows out-of-bounds access, related to \x00 in a string literal.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2019-11835

Publication date:
09/05/2019
cJSON before 1.7.11 allows out-of-bounds access, related to multiline comments.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2019-11832

Publication date:
09/05/2019
TYPO3 8.x before 8.7.25 and 9.x before 9.5.6 allows remote code execution because it does not properly configure the applications used for image processing, as demonstrated by ImageMagick or GraphicsMagick.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2019

CVE-2019-11831

Publication date:
09/05/2019
The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-11830

Publication date:
09/05/2019
PharMetaDataInterceptor in the PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 mishandles Phar stub parsing, which allows attackers to bypass a deserialization protection mechanism.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-7442

Publication date:
08/05/2019
An XML external entity (XXE) vulnerability in the Password Vault Web Access (PVWA) of CyberArk Enterprise Password Vault
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2019

CVE-2019-9698

Publication date:
08/05/2019
Symantec AV Engine, prior to 13.0.9r17, may be susceptible to an arbitrary file deletion issue, which is a type of vulnerability that could allow an attacker to delete files on the resident system without elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-11494

Publication date:
08/05/2019
In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login service crashes when the client disconnects prematurely during the AUTH command.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023