Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2011-3147

Publication date:
22/04/2019
Versions of nova before 2012.1 could expose hypervisor host files to a guest operating system when processing a maliciously constructed qcow filesystem.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2011-3151

Publication date:
22/04/2019
The Ubuntu SELinux initscript before version 1:0.10 used touch to create a lockfile in a world-writable directory. If the OS kernel does not have symlink protections then an attacker can cause a zero byte file to be allocated on any writable filesystem.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2019-11452

Publication date:
22/04/2019
whatsns 4.0 allows index.php?admin_category/remove.html cid[] SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2019

CVE-2019-11450

Publication date:
22/04/2019
whatsns 4.0 allows index.php?question/ajaxadd.html title SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2019

CVE-2019-11451

Publication date:
22/04/2019
whatsns 4.0 allows index.php?inform/add.html qid SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2019

CVE-2019-11243

Publication date:
22/04/2019
In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig()
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2020

CVE-2019-11244

Publication date:
22/04/2019
In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be modified by other users/groups and disrupt the kubectl invocation.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2020

CVE-2019-11449

Publication date:
22/04/2019
I, Librarian 4.10 has XSS via the notes.php notes parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2019

CVE-2019-11446

Publication date:
22/04/2019
An issue was discovered in ATutor through 2.2.4. It allows the user to run commands on the server with the teacher user privilege. The Upload Files section in the File Manager field contains an arbitrary file upload vulnerability via upload.php. The $IllegalExtensions value only lists lowercase (and thus .phP is a bypass), and omits .shtml and .phtml.
Severity CVSS v4.0: Pending analysis
Last modification:
26/04/2019

CVE-2019-11448

Publication date:
22/04/2019
An issue was discovered in Zoho ManageEngine Applications Manager 11.0 through 14.0. An unauthenticated user can gain the authority of SYSTEM on the server due to a Popup_SLA.jsp sid SQL injection vulnerability. For example, the attacker can subsequently write arbitrary text to a .vbs file.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2019

CVE-2019-11447

Publication date:
22/04/2019
An issue was discovered in CutePHP CuteNews 2.1.2. An attacker can infiltrate the server through the avatar upload process in the profile area via the avatar_file field to index.php?mod=main&opt=personal. There is no effective control of $imgsize in /core/modules/dashboard.php. The header content of a file can be changed and the control can be bypassed for code execution. (An attacker can use the GIF header for this.)
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2020

CVE-2019-11428

Publication date:
22/04/2019
I, Librarian 4.10 has XSS via the export.php export_files parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2019