Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-11284

Publication date:
17/10/2019
Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones. A remote unauthenticated malicious user may gain access to credentials for a different server than they have access to.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2019

CVE-2019-17118

Publication date:
17/10/2019
A CSRF issue in WiKID 2FA Enterprise Server through 4.2.0-b2053 allows a remote attacker to trick an authenticated user into performing unintended actions such as (1) create or delete admin users; (2) create or delete groups; or (3) create, delete, enable, or disable normal users or devices.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2019

CVE-2019-17117

Publication date:
17/10/2019
A SQL injection vulnerability in processPref.jsp in WiKID 2FA Enterprise Server through 4.2.0-b2053 allows an authenticated user to execute arbitrary SQL commands via the processPref.jsp key parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2019

CVE-2019-17631

Publication date:
17/10/2019
From Eclipse OpenJ9 0.15 to 0.16, access to diagnostic operations such as causing a GC or creating a diagnostic file are permitted without any privilege checks.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2020

CVE-2019-13411

Publication date:
17/10/2019
An “invalid command” handler issue was discovered in HiNet GPON firmware
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-16330

Publication date:
17/10/2019
In NCH Express Accounts Accounting v7.02, persistent cross site scripting (XSS) exists in Invoices/Sales Orders/Items/Customers/Quotes input field. An authenticated unprivileged user can add/modify the Invoices/Sales Orders/Items/Customers/Quotes fields parameter to inject arbitrary JavaScript.
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2019

CVE-2019-11253

Publication date:
17/10/2019
Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2026

CVE-2019-14423

Publication date:
17/10/2019
A Remote Code Execution (RCE) issue in the addon CUx-Daemon 1.11a of the eQ-3 Homematic CCU-Firmware 2.35.16 until 2.45.6 allows remote authenticated attackers to execute system commands as root remotely via a simple HTTP request.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-14424

Publication date:
17/10/2019
A Local File Inclusion (LFI) issue in the addon CUx-Daemon 1.11a of the eQ-3 Homematic CCU-Firmware 2.35.16 until 2.45.6 allows remote authenticated attackers to read sensitive files via a simple HTTP Request.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2019-15849

Publication date:
17/10/2019
eQ-3 HomeMatic CCU3 firmware 3.41.11 allows session fixation. An attacker can create session IDs and send them to the victim. After the victim logs in to the session, the attacker can use that session. The attacker could create SSH logins after a valid session and easily compromise the system.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2019

CVE-2019-15850

Publication date:
17/10/2019
eQ-3 HomeMatic CCU3 firmware version 3.41.11 allows Remote Code Execution in the ReGa.runScript method. An authenticated attacker can easily execute code and compromise the system.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2019-17672

Publication date:
17/10/2019
WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023