Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-16634

Publication date:
04/12/2018
Pluck v4.7.7 allows CSRF via admin.php?action=settings.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2019

CVE-2018-19591

Publication date:
04/12/2018
In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-19854

Publication date:
04/12/2018
An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option).
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2019

CVE-2018-17157

Publication date:
04/12/2018
In FreeBSD before 11.2-STABLE(r340854) and 11.2-RELEASE-p5, an integer overflow error when handling opcodes can cause memory corruption by sending a specially crafted NFSv4 request. Unprivileged remote users with access to the NFS server may be able to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2019

CVE-2018-17158

Publication date:
04/12/2018
In FreeBSD before 11.2-STABLE(r340854) and 11.2-RELEASE-p5, an integer overflow error can occur when handling the client address length field in an NFSv4 request. Unprivileged remote users with access to the NFS server can crash the system by sending a specially crafted NFSv4 request.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2018

CVE-2018-17159

Publication date:
04/12/2018
In FreeBSD before 11.2-STABLE(r340854) and 11.2-RELEASE-p5, the NFS server lacks a bounds check in the READDIRPLUS NFS request. Unprivileged remote users with access to the NFS server can cause a resource exhaustion by forcing the server to allocate an arbitrarily large memory allocation.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2018

CVE-2018-16478

Publication date:
04/12/2018
A Path Traversal in simplehttpserver versions
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-6981

Publication date:
04/12/2018
VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2022

CVE-2018-6982

Publication date:
04/12/2018
VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may lead to an information leak from host to guest.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2022

CVE-2018-19853

Publication date:
04/12/2018
An issue was discovered in hitshop through 2014-07-15. There is an elevation-of-privilege vulnerability (that allows control over the whole web site) via the admin.php/user/add URI because a storekeeper account (which is supposed to have only privileges for commodity management) can add an administrator account.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-19849

Publication date:
04/12/2018
An issue was discovered in YzmCMS 5.2. XSS exists via the admin/content/search.html searinfo parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2018

CVE-2018-19843

Publication date:
04/12/2018
opmov in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2018