Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2015-1340

Publication date:
22/04/2019
LXD before version 0.19-0ubuntu5 doUidshiftIntoContainer() has an unsafe Chmod() call that races against the stat in the Filepath.Walk() function. A symbolic link created in that window could cause any file on the system to have any mode of the attacker's choice.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2014-1426

Publication date:
22/04/2019
A vulnerability in maasserver.api.get_file_by_name of Ubuntu MAAS allows unauthenticated network clients to download any file. This issue affects: Ubuntu MAAS versions prior to 1.9.2.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2014-1427

Publication date:
22/04/2019
A vulnerability in the REST API of Ubuntu MAAS allows an attacker to cause a logged-in user to execute commands via cross-site scripting. This issue affects MAAS versions prior to 1.9.2.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2014-1428

Publication date:
22/04/2019
A vulnerability in generate_filestorage_key of Ubuntu MAAS allows an attacker to brute-force filenames. This issue affects Ubuntu MAAS versions prior to 1.9.2.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2011-3145

Publication date:
22/04/2019
When mount.ecrpytfs_private before version 87-0ubuntu1.2 calls setreuid() it doesn't also set the effective group id. So when it creates the new version, mtab.tmp, it's created with the group id of the user running mount.ecryptfs_private.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2011-3151

Publication date:
22/04/2019
The Ubuntu SELinux initscript before version 1:0.10 used touch to create a lockfile in a world-writable directory. If the OS kernel does not have symlink protections then an attacker can cause a zero byte file to be allocated on any writable filesystem.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2011-1830

Publication date:
22/04/2019
Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2015-1341

Publication date:
22/04/2019
Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2019

CVE-2011-3147

Publication date:
22/04/2019
Versions of nova before 2012.1 could expose hypervisor host files to a guest operating system when processing a maliciously constructed qcow filesystem.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2019-11452

Publication date:
22/04/2019
whatsns 4.0 allows index.php?admin_category/remove.html cid[] SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2019

CVE-2019-11450

Publication date:
22/04/2019
whatsns 4.0 allows index.php?question/ajaxadd.html title SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2019

CVE-2019-11451

Publication date:
22/04/2019
whatsns 4.0 allows index.php?inform/add.html qid SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2019