Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-7776

Publication date:
03/07/2018
The vulnerability exists within error.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. System information is returned to the attacker that contains sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2018

CVE-2018-7786

Publication date:
03/07/2018
In Schneider Electric U.motion Builder software versions prior to v1.3.4, a cross site scripting (XSS) vulnerability exists which could allow injection of malicious scripts.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2018

CVE-2018-7787

Publication date:
03/07/2018
In Schneider Electric U.motion Builder software versions prior to v1.3.4, this vulnerability is due to improper validation of input of context parameter in HTTP GET request.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2018

CVE-2018-7778

Publication date:
03/07/2018
In Schneider Electric Evlink Charging Station versions prior to v3.2.0-12_v1, the Web Interface has an issue that may allow a remote attacker to gain administrative privileges without properly authenticating remote users.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2018

CVE-2018-7780

Publication date:
03/07/2018
In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, a buffer overflow vulnerability exist in cgi program "set".
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2019

CVE-2018-7770

Publication date:
03/07/2018
The vulnerability exists within processing of sendmail.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The applet allows callers to select arbitrary files to send to an arbitrary email address.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-4851

Publication date:
03/07/2018
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending certain packets to the device, causing potential reboots of the device. The core functionality of the device could be impacted. The time serving functionality recovers when time synchronization with GPS devices or other NTP servers are completed.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-4852

Publication date:
03/07/2018
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could potentially circumvent the authentication mechanism if he/she is able to obtain certain knowledge specific to the attacked device.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-4853

Publication date:
03/07/2018
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the firmware of the device.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-4854

Publication date:
03/07/2018
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the administrative client stored on the device. If a legitimate user downloads and executes the modified client from the affected device, then he/she could obtain code execution on the client system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-4855

Publication date:
03/07/2018
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). Unencrypted storage of passwords in the client configuration files and during network transmission could allow an attacker in a privileged position to obtain access passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-4856

Publication date:
03/07/2018
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with administrative access to the device's management interface could lock out legitimate users. Manual interaction is required to restore the access of legitimate users.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019