Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2012-0126

Publication date:
28/03/2012
Unspecified vulnerability in the WBEM implementation in HP HP-UX 11.11 and 11.23 allows remote attackers to obtain access to diagnostic information via unknown vectors, a related issue to CVE-2012-0125.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1924

Publication date:
28/03/2012
Opera before 11.62 allows user-assisted remote attackers to trick users into downloading and executing arbitrary files via a small window for the download dialog.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1925

Publication date:
28/03/2012
Opera before 11.62 does not ensure that a dialog window is placed on top of content windows, which makes it easier for user-assisted remote attackers to trick users into downloading and executing arbitrary files via a download dialog located under other windows.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1926

Publication date:
28/03/2012
Opera before 11.62 allows remote attackers to bypass the Same Origin Policy via the (1) history.pushState and (2) history.replaceState functions in conjunction with cross-domain frames, leading to unintended read access to history.state information.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1927

Publication date:
28/03/2012
Opera before 11.62 allows remote attackers to spoof the address field by triggering the launch of a dialog window associated with a different domain.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1928

Publication date:
28/03/2012
Opera before 11.62 allows remote attackers to spoof the address field by triggering a page reload followed by a redirect to a different domain.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1929

Publication date:
28/03/2012
Opera before 11.62 on Mac OS X allows remote attackers to spoof the address field and security dialogs via crafted styling that causes page content to be displayed outside of the intended content area.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1930

Publication date:
28/03/2012
Opera before 11.62 on UNIX uses world-readable permissions for temporary files during printing, which allows local users to obtain sensitive information by reading these files.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1931

Publication date:
28/03/2012
Opera before 11.62 on UNIX, when used in conjunction with an unspecified printing application, allows local users to overwrite arbitrary files via a symlink attack on a temporary file during printing.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1918

Publication date:
27/03/2012
Multiple directory traversal vulnerabilities in (1) compose.php and (2) libs/Atmail/SendMsg.php in @Mail WebMail Client in AtMail Open-Source before 1.05 allow remote attackers to read arbitrary files via a .. (dot dot) in the Attachment[] parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1920

Publication date:
27/03/2012
@Mail WebMail Client in AtMail Open-Source 1.04 and earlier allows remote attackers to obtain configuration information via a direct request to install/info.php, which calls the phpinfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1916

Publication date:
27/03/2012
@Mail WebMail Client in AtMail Open-Source before 1.05 allows remote attackers to execute arbitrary code via an e-mail attachment with an executable extension, leading to the creation of an executable file under tmp/.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025