Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-12455

Publication date:
10/10/2018
Intelbras NPLUG 1.0.0.14 wireless repeater devices have a critical vulnerability that allows an attacker to authenticate in the web interface just by using "admin:" as the name of a cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2018

CVE-2018-12596

Publication date:
10/10/2018
Episerver Ektron CMS before 9.0 SP3 Site CU 31, 9.1 before SP3 Site CU 45, or 9.2 before SP2 Site CU 22 allows remote attackers to call aspx pages via the "activateuser.aspx" page, even if a page is located under the /WorkArea/ path, which is forbidden (normally available exclusively for local admins).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-13789

Publication date:
10/10/2018
An issue was discovered in Descor Infocad FM before 3.1.0.0. An unauthenticated web service allows the retrieval of files on the web server and on reachable SMB servers.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-16737

Publication date:
10/10/2018
tinc before 1.0.30 has a broken authentication protocol, without even a partial mitigation.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-16738

Publication date:
10/10/2018
tinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-12544

Publication date:
10/10/2018
In version from 3.5.Beta1 to 3.5.3 of Eclipse Vert.x, the OpenAPI XML type validator creates XML parsers without taking appropriate defense against XML attacks. This mechanism is exclusively when the developer uses the Eclipse Vert.x OpenAPI XML type validator to validate a provided schema.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-12541

Publication date:
10/10/2018
In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the WebSocket HTTP upgrade implementation buffers the full http request before doing the handshake, holding the entire request body in memory. There should be a reasonnable limit (8192 bytes) above which the WebSocket gets an HTTP response with the 413 status code and the connection gets closed.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-12542

Publication date:
10/10/2018
In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the StaticHandler uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\' (forward slashes) sequences that can resolve to a location that is outside of that directory when running on Windows Operating Systems.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-12410

Publication date:
10/10/2018
The web server component of TIBCO Software Inc's Spotfire Statistics Services contains multiple vulnerabilities that may allow the remote execution of code. Without needing to authenticate, an attacker may be able to remotely execute code with the permissions of the system account used to run the web server component. Affected releases are TIBCO Software Inc. TIBCO Spotfire Statistics Services versions up to and including 7.11.0.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2018-12161

Publication date:
10/10/2018
Insufficient session validation in the webserver component of the Intel Rapid Web Server 3 may allow an unauthenticated user to potentially disclose information via network access.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2019

CVE-2018-12158

Publication date:
10/10/2018
Insufficient input validation in BIOS update utility in Intel NUC FW kits downloaded before May 24, 2018 may allow a privileged user to potentially trigger a denial of service or information disclosure via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2018-12172

Publication date:
10/10/2018
Improper password hashing in firmware in Intel Server Board (S7200AP,S7200APR) and Intel Compute Module (HNS7200AP, HNS7200AP) may allow a privileged user to potentially disclose firmware passwords via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019