Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2013-4518

Publication date:
04/11/2019
RHUI (Red Hat Update Infrastructure) 2.1.3 has world readable PKI entitlement certificates
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2019

CVE-2013-4412

Publication date:
04/11/2019
slim has NULL pointer dereference when using crypt() method from glibc 2.17
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2023

CVE-2013-4423

Publication date:
04/11/2019
CloudForms stores user passwords in recoverable format
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2023

CVE-2019-14358

Publication date:
02/11/2019
On Archos Safe-T devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-18673

Publication date:
02/11/2019
On SHIFT BitBox02 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. Note: BIP39 secrets are not displayed by default on this device. The side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-14360

Publication date:
02/11/2019
On Hyundai Pay Kasse HK-1000 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2026

CVE-2019-18668

Publication date:
02/11/2019
An issue was discovered in the Currency Switcher addon before 2.11.2 for WooCommerce if a user provides a currency that was not added by the administrator. In this case, even though the currency does not exist, it will be selected, but a price amount will fall back to the default currency. This means that if an attacker provides a currency that does not exist and is worth less than this default, the attacker can eventually purchase an item for a significantly cheaper price.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-18667

Publication date:
02/11/2019
/usr/local/www/freeradius_view_config.php in the freeradius3 package before 0.15.7_3 for pfSense on FreeBSD allows a user with an XSS payload as password or username to execute arbitrary javascript code on a victim browser.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2019

CVE-2019-18664

Publication date:
02/11/2019
The Log module in SECUDOS DOMOS before 5.6 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2019

CVE-2019-18665

Publication date:
02/11/2019
The Log module in SECUDOS DOMOS before 5.6 allows local file inclusion.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2019

CVE-2019-18662

Publication date:
02/11/2019
An issue was discovered in YouPHPTube through 7.7. User input passed through the live_stream_code POST parameter to /plugin/LiveChat/getChat.json.php is not properly sanitized (in getFromChat in plugin/LiveChat/Objects/LiveChatObj.php) before being used to construct a SQL query. This can be exploited by malicious users to, e.g., read sensitive data from the database through in-band SQL Injection attacks. Successful exploitation of this vulnerability requires the Live Chat plugin to be enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2019

CVE-2019-18661

Publication date:
02/11/2019
Fastweb FASTGate 1.0.1b devices allow partial authentication bypass by changing a certain check_pwd return value from 0 to 1. An attack does not achieve administrative control of a device; however, the attacker can view all of the web pages of the administration console.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020