Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-17532

Publication date:
15/10/2018
Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2018

CVE-2018-15538

Publication date:
15/10/2018
Agentejo Cockpit has multiple Cross-Site Scripting vulnerabilities.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2018

CVE-2018-15540

Publication date:
15/10/2018
Agentejo Cockpit performs actions on files without appropriate validation and therefore allows an attacker to traverse the file system to unintended locations and/or access arbitrary files, aka /media/api Directory Traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2018

CVE-2018-15539

Publication date:
15/10/2018
Agentejo Cockpit lacks an anti-CSRF protection mechanism. Thus, an attacker is able to change API tokens, passwords, etc.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2018

CVE-2017-5934

Publication date:
15/10/2018
Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2018

CVE-2018-12154

Publication date:
15/10/2018
Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user to potentially create an infinite loop and crash an application via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2019

CVE-2018-15378

Publication date:
15/10/2018
A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the "unmew11()" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-18073

Publication date:
15/10/2018
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-15593

Publication date:
15/10/2018
An issue was discovered in Ivanti Workspace Control before 10.3.10.0 and RES One Workspace. A local authenticated user can decrypt the encrypted datastore or relay server password by leveraging an unspecified attack vector.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-17961

Publication date:
15/10/2018
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-15591

Publication date:
15/10/2018
An issue was discovered in Ivanti Workspace Control before 10.3.10.0 and RES One Workspace. A local authenticated user can bypass Application Whitelisting restrictions to execute arbitrary code by leveraging multiple unspecified attack vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-15592

Publication date:
15/10/2018
An issue was discovered in Ivanti Workspace Control before 10.3.10.0 and RES One Workspace. A local authenticated user can execute processes with elevated privileges via an unspecified attack vector.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019