Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-10659

Publication date:
26/06/2018
There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which allows remote attackers to cause a denial of service (crash) by sending a crafted command which will result in a code path that calls the UND undefined ARM instruction.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2018

CVE-2018-10664

Publication date:
26/06/2018
An issue was discovered in the httpd process in multiple models of Axis IP Cameras. There is Memory Corruption.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2018

CVE-2018-10663

Publication date:
26/06/2018
An issue was discovered in multiple models of Axis IP Cameras. There is an Incorrect Size Calculation.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2018

CVE-2018-10658

Publication date:
26/06/2018
There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which causes a denial of service (crash). The crash arises from code inside libdbus-send.so shared object or similar.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2018

CVE-2018-10660

Publication date:
26/06/2018
An issue was discovered in multiple models of Axis IP Cameras. There is Shell Command Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-10661

Publication date:
26/06/2018
An issue was discovered in multiple models of Axis IP Cameras. There is a bypass of access control.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-4845

Publication date:
26/06/2018
A vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 500 systems (All versions_without_ use of Siemens Healthineers Informatics products), RAPIDLab 1200 Series (All versions = V3.0 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (V2.4.X_with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions =
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2023

CVE-2018-10662

Publication date:
26/06/2018
An issue was discovered in multiple models of Axis IP Cameras. There is an Exposed Insecure Interface.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-1072

Publication date:
26/06/2018
ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files. When engine-backup was run with one of the options "--provision*db", the database username and password were logged in cleartext. Sharing the provisioning log might inadvertently leak database passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-11447

Publication date:
26/06/2018
A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by an legitimate user, who must be authenticated to the web interface as administrative user. A successful attack could allow an attacker to interact with the web interface as an administrative user. This could allow the attacker to read or modify the device configuration, or to exploit other vulnerabilities that require authentication as administrative user. At the time of advisory publication no public exploitation of this security vulnerability was known.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-11448

Publication date:
26/06/2018
A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a stored Cross-Site Scripting (XSS) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires that the attacker has access to the web interface of an affected device. The attacker must be authenticated as administrative user on the web interface. Afterwards, a legitimate user must access the web interface. A successful attack could allow an attacker to execute malicious code in the browser of a legitimate user. At the time of advisory publication no public exploitation of this security vulnerability was known.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-11449

Publication date:
26/06/2018
A vulnerability has been identified in SCALANCE M875 (All versions). An attacker with access to the local file system might obtain passwords for administrative users. Successful exploitation requires read access to files on the local file system. A successful attack could allow an attacker to obtain administrative passwords. At the time of advisory publication no public exploitation of this security vulnerability was known.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019