Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-18567

Publication date:
24/10/2018
AudioCodes 440HD and 450HD devices 3.1.2.89 and earlier allows man-in-the-middle attackers to obtain sensitive credential information by leveraging failure to validate X.509 certificates when used with an on-premise installation with Skype for Business.
Severity CVSS v4.0: Pending analysis
Last modification:
07/12/2018

CVE-2018-18621

Publication date:
24/10/2018
CommuniGate Pro 6.2 allows stored XSS via a message body in Pronto! Mail Composer, which is mishandled in /MIME/INBOX-MM-1/ if the raw email link (in .txt format) is modified and then renamed with a .html or .wssp extension.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2018

CVE-2018-18552

Publication date:
24/10/2018
ServersCheck Monitoring Software through 14.3.3 allows local users to cause a denial of service (menu functionality loss) by creating an LNK file that points to a second LNK file, if this second LNK file is associated with a Start menu. Ultimately, this behavior comes from a Directory Traversal bug (via the sensor_details.html id parameter) that allows creating empty files in arbitrary directories.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2018

CVE-2018-18551

Publication date:
24/10/2018
ServersCheck Monitoring Software through 14.3.3 has Persistent and Reflected XSS via the sensors.html status parameter, sensors.html type parameter, sensors.html device parameter, report.html location parameter, group_delete.html group parameter, report_save.html query parameter, sensors.html location parameter, or group_delete.html group parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2018

CVE-2018-18566

Publication date:
24/10/2018
The SIP service in Polycom VVX 500 and 601 devices 5.8.0.12848 and earlier allow remote attackers to obtain sensitive phone configuration information by leveraging use with an on-premise installation with Skype for Business.
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2021

CVE-2018-18568

Publication date:
24/10/2018
Polycom VVX 500 and 601 devices 5.8.0.12848 and earlier allows man-in-the-middle attackers to obtain sensitive credential information by leveraging failure to validate X.509 certificates when used with an on-premise installation with Skype for Business.
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2021

CVE-2018-17921

Publication date:
24/10/2018
SAGA1-L8B with any firmware versions prior to A0.10 are vulnerable to an attack that may allow an attacker to force-pair the device without human interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2020

CVE-2018-17923

Publication date:
24/10/2018
SAGA1-L8B with any firmware versions prior to A0.10 are vulnerable to an attack that an attacker with physical access to the product may able to reprogram it.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-13342

Publication date:
24/10/2018
The server API in the Anda app relies on hardcoded credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2019

CVE-2018-15750

Publication date:
24/10/2018
Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2020

CVE-2018-15751

Publication date:
24/10/2018
SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2020

CVE-2018-17903

Publication date:
24/10/2018
SAGA1-L8B with any firmware versions prior to A0.10 are vulnerable to a replay attack and command forgery.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2020