Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-6201

Publication date:
06/02/2018
A Server Side Request Forgery vulnerability exists in the install app process in Sandstorm before build 0.203. A remote attacker may exploit this issue by providing a URL. It could bypass access control such as firewalls that prevent the attackers from accessing the URLs directly.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2018

CVE-2014-5280

Publication date:
06/02/2018
boot2docker 1.2 and earlier allows attackers to conduct cross-site request forgery (CSRF) attacks by leveraging Docker daemons enabling TCP connections without TLS authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2014-5282

Publication date:
06/02/2018
Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2014-5279

Publication date:
06/02/2018
The Docker daemon managed by boot2docker 1.2 and earlier improperly enables unauthenticated TCP connections by default, which makes it easier for remote attackers to gain privileges or execute arbitrary code from children containers.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-6288

Publication date:
06/02/2018
Cross-site Request Forgery leading to Administrative account takeover in Kaspersky Secure Mail Gateway version 1.1.
Severity CVSS v4.0: Pending analysis
Last modification:
01/03/2018

CVE-2018-6289

Publication date:
06/02/2018
Configuration file injection leading to Code Execution as Root in Kaspersky Secure Mail Gateway version 1.1.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2018

CVE-2018-6291

Publication date:
06/02/2018
WebConsole Cross-Site Scripting in Kaspersky Secure Mail Gateway version 1.1.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2018

CVE-2018-6290

Publication date:
06/02/2018
Local Privilege Escalation in Kaspersky Secure Mail Gateway version 1.1.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2017-7525

Publication date:
06/02/2018
A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2017-15095

Publication date:
06/02/2018
A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-6469

Publication date:
06/02/2018
A cross-site scripting (XSS) vulnerability in flickrRSS.php in the flickrRSS plugin 5.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the flickrRSS_tags parameter to wp-admin/options-general.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/02/2018

CVE-2018-6466

Publication date:
06/02/2018
A cross-site scripting (XSS) vulnerability in flickrRSS.php in the flickrRSS plugin 5.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the flickrRSS_set parameter to wp-admin/options-general.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/02/2018