Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-18263

Publication date:
20/12/2019
An issue was found in Philips Veradius Unity, Pulsera, and Endura Dual WAN Router, Veradius Unity (718132) with wireless option (shipped between 2016-August 2018), Veradius Unity (718132) with ViewForum option (shipped between 2016-August 2018), Pulsera (718095) and Endura (718075) with wireless option (shipped between 26-June-2017 through 07-August 2018), Pulsera (718095) and Endura (718075) with ViewForum option (shipped between 26-June-2017 through 07-August 2018). The router software uses an encryption scheme that is not strong enough for the level of protection required.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2020

CVE-2019-17440

Publication date:
20/12/2019
Improper restriction of communications to Log Forwarding Card (LFC) on PA-7000 Series devices with second-generation Switch Management Card (SMC) may allow an attacker with network access to the LFC to gain root access to PAN-OS. This issue affects PAN-OS 9.0 versions prior to 9.0.5-h3 on PA-7080 and PA-7050 devices with an LFC installed and configured. This issue does not affect PA-7000 Series deployments using the first-generation SMC and the Log Processing Card (LPC). This issue does not affect any other PA series devices. This issue does not affect devices without an LFC. This issue does not affect PAN-OS 8.1 or prior releases. This issue only affected a very limited number of customers and we undertook individual outreach to help them upgrade. At the time of publication, all identified customers have upgraded SW or content and are not impacted.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2020

CVE-2019-19691

Publication date:
20/12/2019
A vulnerability in Trend Micro Apex One and OfficeScan XG could allow an attacker to expose a masked credential key by manipulating page elements using development tools. Note that the attacker must already have admin/root privileges on the product console to exploit this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2012-6111

Publication date:
20/12/2019
gnome-keyring does not discard stored secrets when using gnome_keyring_lock_all_sync function
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2020

CVE-2012-6094

Publication date:
20/12/2019
cups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could provide unauthorized access to the system
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2020

CVE-2015-8313

Publication date:
20/12/2019
GnuTLS incorrectly validates the first byte of padding in CBC modes
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2020

CVE-2012-3409

Publication date:
20/12/2019
ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2016-1000229

Publication date:
20/12/2019
swagger-ui has XSS in key names
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2019

CVE-2012-5639

Publication date:
20/12/2019
LibreOffice and OpenOffice automatically open embedded content
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2024

CVE-2019-19789

Publication date:
20/12/2019
3S-Smart CODESYS SP Realtime NT before V2.3.7.28, CODESYS Runtime Toolkit 32 bit full before V2.4.7.54, and CODESYS PLCWinNT before V2.4.7.54 allow a NULL pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2020

CVE-2016-1000022

Publication date:
20/12/2019
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-10539. Reason: This candidate is a duplicate of CVE-2016-10539. Notes: All CVE users should reference CVE-2016-10539 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-19908

Publication date:
20/12/2019
phpMyChat-Plus 1.98 is vulnerable to reflected XSS via JavaScript injection into the password reset URL. In the URL, the pmc_username parameter to pass_reset.php is vulnerable.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2019