Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-16741

Publication date:
13/09/2018
An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &&, or > characters within a file created by the "faxq-helper activate " command.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-16744

Publication date:
13/09/2018
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-16796

Publication date:
13/09/2018
HiScout GRC Suite before 3.1.5 allows Unrestricted Upload of Files with Dangerous Types.
Severity CVSS v4.0: Pending analysis
Last modification:
25/11/2018

CVE-2018-16742

Publication date:
13/09/2018
An issue was discovered in mgetty before 1.2.1. In contrib/scrts.c, a stack-based buffer overflow can be triggered via a command-line parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-16743

Publication date:
13/09/2018
An issue was discovered in mgetty before 1.2.1. In contrib/next-login/login.c, the command-line parameter username is passed unsanitized to strcpy(), which can cause a stack-based buffer overflow.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-16987

Publication date:
13/09/2018
Squash TM through 1.18.0 presents the cleartext passwords of external services in the administration panel, as demonstrated by a ta-server-password field in the HTML source code.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-1698

Publication date:
13/09/2018
IBM Maximo Asset Management 7.6 through 7.6.3 could allow an unauthenticated attacker to obtain sensitive information from error messages. IBM X-Force ID: 145967.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-5549

Publication date:
13/09/2018
On BIG-IP APM 11.6.0-11.6.3.1, 12.1.0-12.1.3.3, 13.0.0, and 13.1.0-13.1.0.3, APMD may core when processing SAML Assertion or response containing certain elements.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2019

CVE-2018-15310

Publication date:
13/09/2018
A vulnerability in BIG-IP APM portal access 11.5.1-11.5.7, 11.6.0-11.6.3, and 12.1.0-12.1.3 discloses the BIG-IP software version in rewritten pages.
Severity CVSS v4.0: Pending analysis
Last modification:
27/11/2018

CVE-2018-16985

Publication date:
13/09/2018
In Lizard (formerly LZ5) 2.0, use of an invalid memory address was discovered in LZ5_compress_continue in lz5_compress.c, related to LZ5_compress_fastSmall and MEM_read32. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
27/11/2018

CVE-2018-5545

Publication date:
13/09/2018
On F5 WebSafe Alert Server 1.0.0-4.2.6, a malicious, authenticated user can execute code on the alert server by using a maliciously crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2018

CVE-2018-5548

Publication date:
13/09/2018
On BIG-IP APM 11.6.0-11.6.3, an insecure AES ECB mode is used for orig_uri parameter in an undisclosed /vdesk link of APM virtual server configured with an access profile, allowing a malicious user to build a redirect URI value using different blocks of cipher texts.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2018