Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2012-1927

Publication date:
28/03/2012
Opera before 11.62 allows remote attackers to spoof the address field by triggering the launch of a dialog window associated with a different domain.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1928

Publication date:
28/03/2012
Opera before 11.62 allows remote attackers to spoof the address field by triggering a page reload followed by a redirect to a different domain.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1929

Publication date:
28/03/2012
Opera before 11.62 on Mac OS X allows remote attackers to spoof the address field and security dialogs via crafted styling that causes page content to be displayed outside of the intended content area.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1930

Publication date:
28/03/2012
Opera before 11.62 on UNIX uses world-readable permissions for temporary files during printing, which allows local users to obtain sensitive information by reading these files.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1931

Publication date:
28/03/2012
Opera before 11.62 on UNIX, when used in conjunction with an unspecified printing application, allows local users to overwrite arbitrary files via a symlink attack on a temporary file during printing.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1918

Publication date:
27/03/2012
Multiple directory traversal vulnerabilities in (1) compose.php and (2) libs/Atmail/SendMsg.php in @Mail WebMail Client in AtMail Open-Source before 1.05 allow remote attackers to read arbitrary files via a .. (dot dot) in the Attachment[] parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1920

Publication date:
27/03/2012
@Mail WebMail Client in AtMail Open-Source 1.04 and earlier allows remote attackers to obtain configuration information via a direct request to install/info.php, which calls the phpinfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1916

Publication date:
27/03/2012
@Mail WebMail Client in AtMail Open-Source before 1.05 allows remote attackers to execute arbitrary code via an e-mail attachment with an executable extension, leading to the creation of an executable file under tmp/.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1917

Publication date:
27/03/2012
compose.php in @Mail WebMail Client in AtMail Open-Source before 1.05 does not properly handle ../ (dot dot slash) sequences in the unique parameter, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ..././ (dot dot dot slash dot slash) sequence.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1919

Publication date:
27/03/2012
CRLF injection vulnerability in mime.php in @Mail WebMail Client in AtMail Open-Source before 1.05 allows remote attackers to conduct directory traversal attacks and read arbitrary files via a %0A sequence followed by a .. (dot dot) in the file parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1569

Publication date:
26/03/2012
The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2012-1573

Publication date:
26/03/2012
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025