Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-12927

Publication date:
28/06/2018
Northern Electric & Power (NEP) inverter devices allow remote attackers to obtain potentially sensitive information via a direct request for the nep/status/index/1 URI.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2018

CVE-2018-12921

Publication date:
28/06/2018
Electro Industries GaugeTech Nexus devices allow remote attackers to obtain potentially sensitive information via a direct request for the meter_information.htm, diag_system.htm, or diag_dnp_lan_wan.htm URI.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2018

CVE-2018-5528

Publication date:
27/06/2018
Under certain conditions, TMM may restart and produce a core file while processing APM data on BIG-IP 13.0.1 or 13.1.0.4-13.1.0.7.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2018

CVE-2018-5527

Publication date:
27/06/2018
On BIG-IP 13.1.0-13.1.0.7, a remote attacker using undisclosed methods against virtual servers configured with a Client SSL or Server SSL profile that has the SSL Forward Proxy feature enabled can force the Traffic Management Microkernel (tmm) to leak memory. As a result, system memory usage increases over time, which may eventually cause a decrease in performance or a system reboot due to memory exhaustion.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-1355

Publication date:
27/06/2018
An open redirect vulnerability in Fortinet FortiManager 6.0.0, 5.6.5 and below versions, FortiAnalyzer 6.0.0, 5.6.5 and below versions allows attacker to inject script code during converting a HTML table to a PDF document under the FortiView feature. An attacker may be able to social engineer an authenticated user into generating a PDF file containing injected malicious URLs.
Severity CVSS v4.0: Pending analysis
Last modification:
08/03/2019

CVE-2018-1354

Publication date:
27/06/2018
An improper access control vulnerability in Fortinet FortiManager 6.0.0, 5.6.5 and below versions, FortiAnalyzer 6.0.0, 5.6.5 and below versions allows a regular user edit the avatar picture of other users with arbitrary content.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2017-16718

Publication date:
27/06/2018
Beckhoff TwinCAT 3 supports communication over ADS. ADS is a protocol for industrial automation in protected environments. This protocol uses user configured routes, that can be edited remotely via ADS. This special command supports encrypted authentication with username/password. The encryption uses a fixed key, that could be extracted by an attacker. Precondition of the exploitation of this weakness is network access at the moment a route is added.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2017-16726

Publication date:
27/06/2018
Beckhoff TwinCAT supports communication over ADS. ADS is a protocol for industrial automation in protected environments. ADS has not been designed to achieve security purposes and therefore does not include any encryption algorithms because of their negative effect on performance and throughput. An attacker can forge arbitrary ADS packets when legitimate ADS traffic is observable.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-1306

Publication date:
27/06/2018
The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An attacker could exploit this vulnerability to obtain configuration data and other sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
01/03/2019

CVE-2018-12913

Publication date:
27/06/2018
In Miniz 2.0.7, tinfl_decompress in miniz_tinfl.c has an infinite loop because sym2 and counter can both remain equal to zero.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-12915

Publication date:
27/06/2018
In libpbc.a in PBC through 2017-03-02, there is a buffer over-read in calc_hash in map.c.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-12917

Publication date:
27/06/2018
In libpbc.a in PBC through 2017-03-02, there is a heap-based buffer over-read in _pbcM_ip_new in map.c.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019