Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-14054

Publication date:
13/07/2018
A double free exists in the MP4StringProperty class in mp4property.cpp in MP4v2 2.0.0. A dangling pointer is freed again in the destructor once an exception is triggered.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-1255

Publication date:
13/07/2018
RSA Identity Lifecycle and Governance versions 7.0.1, 7.0.2 and 7.1.0 contains a reflected cross-site scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to supply malicious HTML or JavaScript code to a vulnerable web application, which is then reflected back to the victim and executed by the web browser.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-1245

Publication date:
13/07/2018
RSA Identity Lifecycle and Governance versions 7.0.1, 7.0.2 and 7.1.0 contains an authorization bypass vulnerability within the workflow architect component (ACM). A remote authenticated malicious user with non-admin privileges could potentially bypass the Java Security Policies. Once bypassed, a malicious user could potentially run arbitrary system commands at the OS level with application owner privileges on the affected system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-14047

Publication date:
13/07/2018
An issue has been found in PNGwriter 0.7.0. It is a SEGV in pngwriter::readfromfile in pngwriter.cc. NOTE: there is a "Warning: PNGwriter was never designed for reading untrusted files with it. Do NOT use this in sensitive environments, especially DO NOT read PNGs from unknown sources with it!" statement in the master/README.md file
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024

CVE-2018-14049

Publication date:
13/07/2018
An issue has been found in libwav through 2017-04-20. It is a SEGV in the function print_info in wav_info/wav_info.c.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-14050

Publication date:
13/07/2018
An issue has been found in libwav through 2017-04-20. It is a SEGV in the function wav_free in libwav.c.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-14051

Publication date:
13/07/2018
The function wav_read in libwav.c in libwav through 2017-04-20 has an infinite loop.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-14052

Publication date:
13/07/2018
An issue has been found in libwav through 2017-04-20. It is a SEGV in the function apply_gain in wav_gain/wav_gain.c.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-9067

Publication date:
13/07/2018
The Lenovo Help Android app versions earlier than 6.1.2.0327 had insufficient access control for some functions which, if exploited, could have led to exposure of approximately 400 email addresses and 8,500 IMEI.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-9070

Publication date:
13/07/2018
For the Lenovo Smart Assistant Android app versions earlier than 12.1.82, an attacker with physical access to the smart speaker can, by pressing a specific button sequence, enter factory test mode and enable a web service intended for testing the device. As with most test modes, this provides extra privileges, including changing settings and running code. Lenovo Smart Assistant is an Amazon Alexa-enabled smart speaker developed by Lenovo.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2017-1367

Publication date:
13/07/2018
IBM Security Identity Governance and Intelligence Virtual Appliance 5.2 through 5.2.3.2 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 126860.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2017-1395

Publication date:
13/07/2018
IBM Security Identity Governance and Intelligence Virtual Appliance 5.2 through 5.2.3.2 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 127341.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019