Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-12934

Publication date:
28/06/2018
remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2020

CVE-2018-12932

Publication date:
28/06/2018
PlayEnhMetaFileRecord in enhmetafile.c in Wine 3.7 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by triggering a large pAlphaBlend->cbBitsSrc value.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-12589

Publication date:
28/06/2018
Polaris Office 2017 8.1 allows attackers to execute arbitrary code via a Trojan horse puiframeworkproresenu.dll file in the current working directory.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2018

CVE-2018-12928

Publication date:
28/06/2018
In the Linux kernel 4.15.0, a NULL pointer dereference was discovered in hfs_ext_read_extent in hfs.ko. This can occur during a mount of a crafted hfs filesystem.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2018

CVE-2017-16859

Publication date:
28/06/2018
The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within context path of the running application through a path traversal vulnerability in the command parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2018

CVE-2018-12933

Publication date:
28/06/2018
PlayEnhMetaFileRecord in enhmetafile.c in Wine 3.7 allows attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact because the attacker controls the pCreatePen->ihPen array index.
Severity CVSS v4.0: Pending analysis
Last modification:
17/08/2018

CVE-2018-12925

Publication date:
28/06/2018
Baseon Lantronix MSS devices do not require a password for TELNET access.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-12920

Publication date:
28/06/2018
Brickstream 2300 devices allow remote attackers to obtain potentially sensitive information via a direct request for the basic.html#ipsettings or basic.html#datadelivery URI.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2021

CVE-2018-12922

Publication date:
28/06/2018
Emerson Liebert IntelliSlot Web Card devices allow remote attackers to reconfigure access control via the config/configUser.htm or config/configTelnet.htm URI.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2021

CVE-2018-12923

Publication date:
28/06/2018
BWS Systems HA-Bridge devices allow remote attackers to obtain potentially sensitive information via a direct request for the #!/system URI.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2020

CVE-2018-12924

Publication date:
28/06/2018
Sollae Serial-Ethernet-Module and Remote-I/O-Device-Server devices have a default password of sollae for the TELNET service.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2018

CVE-2018-12926

Publication date:
28/06/2018
Pharos Controls devices allow remote attackers to obtain potentially sensitive information via a direct request for the default/index.lsp or default/log.lsp URI.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2018