Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-15843

Publication date:
12/06/2018
Due to a race condition in a bus driver, a double free in msm_bus_floor_vote_context() can potentially occur in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2018

CVE-2017-15842

Publication date:
12/06/2018
Buffer might get used after it gets freed due to unlocking the mutex before freeing the buffer in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2018

CVE-2018-5843

Publication date:
12/06/2018
In the function wma_pdev_div_info_evt_handler() in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel, there is no upper bound check on the value event->num_chains_valid received from firmware which can lead to a buffer overwrite of the fixed size chain_rssi_result structure.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2018

CVE-2018-5847

Publication date:
12/06/2018
Early or late retirement of rotation requests can result in a Use After Free condition in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2018

CVE-2018-3582

Publication date:
12/06/2018
Buffer overflow can occur due to improper input validation in multiple WMA event handler functions in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2018

CVE-2018-3579

Publication date:
12/06/2018
In the WLAN driver in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel, event->num_entries_in_page is a value received from firmware that is not properly validated which can lead to a buffer over-read
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-5848

Publication date:
12/06/2018
In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2019

CVE-2018-12257

Publication date:
12/06/2018
An issue was discovered on Momentum Axel 720P 5.1.8 devices. There is Authenticated Custom Firmware Upgrade via DNS Hijacking. An authenticated root user with CLI access is able to remotely upgrade firmware to a custom image due to lack of SSL validation by changing the nameservers in /etc/resolv.conf to the attacker's server, and serving the expected HTTPS response containing new firmware for the device to download.
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2018

CVE-2017-18287

Publication date:
12/06/2018
An issue was discovered in PvPGN Stats 2.4.6. SQL Injection exists in ladder/stats.php via the POST user_search parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2018

CVE-2017-18288

Publication date:
12/06/2018
An issue was discovered in PvPGN Stats 2.4.6. SQL Injection exists in ladder/stats.php via the GET game parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2018

CVE-2017-18289

Publication date:
12/06/2018
An issue was discovered in PvPGN Stats 2.4.6. SQL Injection exist in ladder/stats.php via the GET type parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2018

CVE-2017-18290

Publication date:
12/06/2018
An issue was discovered in PvPGN Stats 2.4.6. SQL Injection exists in ladder/stats.php via the GET sort_direction parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2018