Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-12482

Publication date:
30/05/2019
An issue was discovered in GPAC 0.7.1. There is a NULL pointer dereference in the function gf_isom_get_original_format_type at isomedia/drm_sample.c in libgpac.a, as demonstrated by MP4Box.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2019-12483

Publication date:
30/05/2019
An issue was discovered in GPAC 0.7.1. There is a heap-based buffer overflow in the function ReadGF_IPMPX_RemoveToolNotificationListener in odf/ipmpx_code.c in libgpac.a, as demonstrated by MP4Box.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2019-12480

Publication date:
30/05/2019
BACnet Protocol Stack through 0.8.6 has a segmentation fault leading to denial of service in BACnet APDU Layer because a malformed DCC in AtomicWriteFile, AtomicReadFile and DeviceCommunicationControl services. An unauthenticated remote attacker could cause a denial of service (bacserv daemon crash) because there is an invalid read in bacdcode.c during parsing of alarm tag numbers.
Severity CVSS v4.0: Pending analysis
Last modification:
19/07/2019

CVE-2015-7609

Publication date:
30/05/2019
Synacor Zimbra Mail Client 8.6 before 8.6.0 Patch 5 has XSS via the error/warning dialog and email body content in Zimbra.
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2019

CVE-2015-2230

Publication date:
30/05/2019
Synacor Zimbra Collaboration Server 8.x before 8.7.0 has Reflected XSS in admin console.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2020

CVE-2019-9723

Publication date:
30/05/2019
LogicalDOC Community Edition 8.x before 8.2.1 has a path traversal vulnerability that allows reading arbitrary files and the creation of directories, in the class PluginRegistry.
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2019

CVE-2018-14425

Publication date:
30/05/2019
There is a Persistent XSS vulnerability in the briefcase component of Synacor Zimbra Collaboration Suite (ZCS) Zimbra Web Client (ZWC) 8.8.8 before 8.8.8 Patch 7 and 8.8.9 before 8.8.9 Patch 1.
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2019

CVE-2018-10948

Publication date:
30/05/2019
Synacor Zimbra Admin UI in Zimbra Collaboration Suite before 8.8.0 beta 2 has Persistent XSS via mail addrs.
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2019

CVE-2018-4048

Publication date:
30/05/2019
An exploitable local privilege elevation vulnerability exists in the file system permissions of the `Temp` directory in GOG Galaxy 1.2.48.36 (Windows 64-bit Installer). An attacker can overwrite executables of the Desktop Galaxy Updater to exploit this vulnerability and execute arbitrary code with SYSTEM privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
07/06/2022

CVE-2018-13368

Publication date:
30/05/2019
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the command injection.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-9191

Publication date:
30/05/2019
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attackers to execute unauthorized code or commands via the named pipe responsible for Forticlient updates.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-9193

Publication date:
30/05/2019
A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2025