Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-12934

Publication date:
28/06/2018
remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2020

CVE-2018-12932

Publication date:
28/06/2018
PlayEnhMetaFileRecord in enhmetafile.c in Wine 3.7 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by triggering a large pAlphaBlend->cbBitsSrc value.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-12924

Publication date:
28/06/2018
Sollae Serial-Ethernet-Module and Remote-I/O-Device-Server devices have a default password of sollae for the TELNET service.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2018

CVE-2018-12921

Publication date:
28/06/2018
Electro Industries GaugeTech Nexus devices allow remote attackers to obtain potentially sensitive information via a direct request for the meter_information.htm, diag_system.htm, or diag_dnp_lan_wan.htm URI.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2018

CVE-2018-12926

Publication date:
28/06/2018
Pharos Controls devices allow remote attackers to obtain potentially sensitive information via a direct request for the default/index.lsp or default/log.lsp URI.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2018

CVE-2018-12927

Publication date:
28/06/2018
Northern Electric & Power (NEP) inverter devices allow remote attackers to obtain potentially sensitive information via a direct request for the nep/status/index/1 URI.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2018

CVE-2018-12925

Publication date:
28/06/2018
Baseon Lantronix MSS devices do not require a password for TELNET access.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-12920

Publication date:
28/06/2018
Brickstream 2300 devices allow remote attackers to obtain potentially sensitive information via a direct request for the basic.html#ipsettings or basic.html#datadelivery URI.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2021

CVE-2018-12922

Publication date:
28/06/2018
Emerson Liebert IntelliSlot Web Card devices allow remote attackers to reconfigure access control via the config/configUser.htm or config/configTelnet.htm URI.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2021

CVE-2018-12923

Publication date:
28/06/2018
BWS Systems HA-Bridge devices allow remote attackers to obtain potentially sensitive information via a direct request for the #!/system URI.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2020

CVE-2018-5528

Publication date:
27/06/2018
Under certain conditions, TMM may restart and produce a core file while processing APM data on BIG-IP 13.0.1 or 13.1.0.4-13.1.0.7.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2018

CVE-2018-5527

Publication date:
27/06/2018
On BIG-IP 13.1.0-13.1.0.7, a remote attacker using undisclosed methods against virtual servers configured with a Client SSL or Server SSL profile that has the SSL Forward Proxy feature enabled can force the Traffic Management Microkernel (tmm) to leak memory. As a result, system memory usage increases over time, which may eventually cause a decrease in performance or a system reboot due to memory exhaustion.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019