Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-6480

Publication date:
31/01/2018
A type confusion issue was discovered in CCN-lite 2, leading to a memory access violation and a failure of the nonce feature (which, for example, helped with loop prevention). ccnl_fwd_handleInterest assumes that the union member s is of type ccnl_pktdetail_ndntlv_s. However, if the type is in fact struct ccnl_pktdetail_ccntlv_s or struct ccnl_pktdetail_iottlv_s, the memory at that point is either uninitialised or points to data that is not a nonce, which renders the code using the local variable nonce pointless. A later nonce check is insufficient.
Severity CVSS v4.0: Pending analysis
Last modification:
21/02/2018

CVE-2017-15655

Publication date:
31/01/2018
Multiple buffer overflow vulnerabilities exist in the HTTPd server in Asus asuswrt version
Severity CVSS v4.0: Pending analysis
Last modification:
21/02/2018

CVE-2017-18043

Publication date:
31/01/2018
Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2017-15654

Publication date:
31/01/2018
Highly predictable session tokens in the HTTPd server in all current versions (
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2017-15656

Publication date:
31/01/2018
Password are stored in plaintext in nvram in the HTTPd server in all current versions (
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2017-16928

Publication date:
31/01/2018
The arq_updater binary in Arq 5.10 and earlier for Mac allows local users to write to arbitrary files and consequently gain root privileges via a crafted update URL, as demonstrated by file:///tmp/blah/Arq.zip.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2021

CVE-2017-16945

Publication date:
31/01/2018
The standardrestorer binary in Arq 5.10 and earlier for Mac allows local users to write to arbitrary files and consequently gain root privileges via a crafted restore path.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2021

CVE-2018-0136

Publication date:
31/01/2018
A vulnerability in the IPv6 subsystem of Cisco IOS XR Software Release 5.3.4 for the Cisco Aggregation Services Router (ASR) 9000 Series could allow an unauthenticated, remote attacker to trigger a reload of one or more Trident-based line cards, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect handling of IPv6 packets with a fragment header extension. An attacker could exploit this vulnerability by sending IPv6 packets designed to trigger the issue either to or through the Trident-based line card. A successful exploit could allow the attacker to trigger a reload of Trident-based line cards, resulting in a DoS during the period of time the line card takes to restart. This vulnerability affects Cisco Aggregation Services Router (ASR) 9000 Series when the following conditions are met: The router is running Cisco IOS XR Software Release 5.3.4, and the router has installed Trident-based line cards that have IPv6 configured. A software maintenance upgrade (SMU) has been made available that addresses this vulnerability. The fix has also been incorporated into service pack 7 for Cisco IOS XR Software Release 5.3.4. Cisco Bug IDs: CSCvg46800.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2020

CVE-2018-6479

Publication date:
31/01/2018
An issue was discovered on Netwave IP Camera devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to the / URI.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2021

CVE-2018-6476

Publication date:
31/01/2018
In SUPERAntiSpyware Professional Trial 6.0.1254, the SASKUTIL.SYS driver allows privilege escalation to NT AUTHORITY\SYSTEM because of not validating input values from IOCtl 0x9C402114 or 0x9C402124 or 0x9C40207c.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2018

CVE-2018-6473

Publication date:
31/01/2018
In SUPERAntiSpyware Professional Trial 6.0.1254, the driver file (SASKUTIL.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402080.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2018

CVE-2018-6474

Publication date:
31/01/2018
In SUPERAntiSpyware Professional Trial 6.0.1254, the driver file (SASKUTIL.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402148.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2018