Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-19598

Publication date:
19/12/2018
Statamic 2.10.3 allows XSS via First Name or Last Name to the /users URI in an 'Add new user' request.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2019

CVE-2018-18999

Publication date:
19/12/2018
WebAccess/SCADA, WebAccess/SCADA Version 8.3.2 installed on Windows 2008 R2 SP1. Lack of proper validation of user supplied input may allow an attacker to cause the overflow of a buffer on the stack.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2020

CVE-2018-20298

Publication date:
19/12/2018
S3 Browser before 8.1.5 contains an XML external entity (XXE) vulnerability, allowing remote attackers to read arbitrary files and obtain NTLMv2 hash values by tricking a user into connecting to a malicious server via the S3 protocol.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2019

CVE-2018-15126

Publication date:
19/12/2018
LibVNC before commit 73cb96fec028a576a5a24417b57723b55854ad7b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2019

CVE-2018-15127

Publication date:
19/12/2018
LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2020

CVE-2018-6307

Publication date:
19/12/2018
LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2019

CVE-2018-20022

Publication date:
19/12/2018
LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2020

CVE-2018-20023

Publication date:
19/12/2018
LibVNC before 8b06f835e259652b0ff026898014fc7297ade858 contains CWE-665: Improper Initialization vulnerability in VNC Repeater client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2020

CVE-2018-20024

Publication date:
19/12/2018
LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains null pointer dereference in VNC client code that can result DoS.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2020

CVE-2018-20019

Publication date:
19/12/2018
LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains multiple heap out-of-bound write vulnerabilities in VNC client code that can result remote code execution
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2022

CVE-2018-20020

Publication date:
19/12/2018
LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2020

CVE-2018-20021

Publication date:
19/12/2018
LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2020