Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-20380

Publication date:
23/12/2018
Ambit DDW2600 5.100.1009, DDW2602 5.105.1003, T60C926 4.64.1012, and U10C019 5.66.1026 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-20381

Publication date:
23/12/2018
Technicolor DPC2320 dpc2300r2-v202r1244101-150420a-v6 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-20383

Publication date:
23/12/2018
ARRIS DG950A 7.10.145 and DG950S 7.10.145.EURO devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2021

CVE-2018-20386

Publication date:
23/12/2018
ARRIS SBG6580-2 D30GW-SEAEAGLE-1.5.2.5-GA-00-NOSH devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2021

CVE-2018-20389

Publication date:
23/12/2018
D-Link DCM-604 DCM604_C1_ViaCabo_1.04_20130606 and DCM-704 EU_DCM-704_1.10 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
Severity CVSS v4.0: Pending analysis
Last modification:
26/04/2023

CVE-2018-20376

Publication date:
23/12/2018
An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to an 8 byte out of bounds write in the asm_parse_directive function in tccasm.c.
Severity CVSS v4.0: Pending analysis
Last modification:
06/01/2019

CVE-2018-20375

Publication date:
23/12/2018
An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to an 8 byte out of bounds write in the sym_pop function in tccgen.c.
Severity CVSS v4.0: Pending analysis
Last modification:
06/01/2019

CVE-2018-20374

Publication date:
23/12/2018
An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to an 8 byte out of bounds write in the use_section1 function in tccasm.c.
Severity CVSS v4.0: Pending analysis
Last modification:
06/01/2019

CVE-2018-20377

Publication date:
23/12/2018
Orange Livebox 00.96.320S devices allow remote attackers to discover Wi-Fi credentials via /get_getnetworkconf.cgi on port 8080, leading to full control if the admin password equals the Wi-Fi password or has the default admin value. This is related to Firmware 01.11.2017-11:43:44, Boot v0.70.03, Modem 5.4.1.10.1.1A, Hardware 02, and Arcadyan ARV7519RW22-A-L T VR9 1.2.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-20372

Publication date:
23/12/2018
TP-Link TD-W8961ND devices allow XSS via the hostname of a DHCP client.
Severity CVSS v4.0: Pending analysis
Last modification:
11/01/2019

CVE-2018-20373

Publication date:
23/12/2018
Tenda ADSL modem routers 1.0.1 allow XSS via the hostname of a DHCP client.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2019

CVE-2018-20369

Publication date:
23/12/2018
Barracuda Message Archiver 2018 has XSS in the error_msg exception-handling value for the ldap_user parameter to the cgi-mod/ldap_load_entry.cgi module. The injection point of the issue is the Add_Update module.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2019