Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-14451

Publication date:
20/07/2018
An issue was discovered in libgig 4.1.0. There is a heap-based buffer overflow in the function RIFF::Chunk::Read in RIFF.cpp.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-14453

Publication date:
20/07/2018
An issue was discovered in libgig 4.1.0. There is a heap-based buffer overflow in pData[1] access in the function store16 in helper.h.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-14458

Publication date:
20/07/2018
An issue was discovered in libgig 4.1.0. There is a heap-based buffer overflow in pData[1] access in the function store32 in helper.h.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020

CVE-2018-14444

Publication date:
20/07/2018
libdxfrw 0.6.3 has an Integer Overflow in dwgCompressor::decompress18 in dwgutil.cpp, leading to an out-of-bounds read and application crash.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2018

CVE-2018-14443

Publication date:
20/07/2018
get_first_owned_object in dwg.c in GNU LibreDWG 0.5.1036 allows remote attackers to cause a denial of service (SEGV).
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2018

CVE-2018-14447

Publication date:
20/07/2018
trim_whitespace in lexer.l in libConfuse v3.2.1 has an out-of-bounds read.
Severity CVSS v4.0: Pending analysis
Last modification:
14/09/2018

CVE-2018-14448

Publication date:
20/07/2018
Codec::parse in track.cpp in Untrunc through 2018-06-07 has a NULL pointer dereference via a crafted MP4 file because of improper interaction with libav.
Severity CVSS v4.0: Pending analysis
Last modification:
14/09/2018

CVE-2018-14445

Publication date:
20/07/2018
In Bento4 v1.5.1-624, AP4_File::ParseStream in Ap4File.cpp allows remote attackers to cause a denial of service (infinite loop) via a crafted MP4 file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-14446

Publication date:
20/07/2018
MP4Integer32Property::Read in atom_avcC.cpp in MP4v2 2.1.0 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted MP4 file.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-14442

Publication date:
20/07/2018
Foxit Reader before 9.2 and PhantomPDF before 9.2 have a Use-After-Free that leads to Remote Code Execution, aka V-88f4smlocs.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2018

CVE-2016-10727

Publication date:
20/07/2018
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. The server code was intended to report an error and not proceed, but the code was written incorrectly.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2018

CVE-2018-8018

Publication date:
20/07/2018
In Apache Ignite before 2.4.8 and 2.5.x before 2.5.3, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to GridClientJdkMarshaller deserialization endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023