Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-6198

Publication date:
06/02/2018
The Supervisor in Sandstorm doesn't set and enforce the resource limits of a process. This allows remote attackers to cause a denial of service by launching a fork bomb in the sandbox, or by using a large amount of disk space.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2018

CVE-2017-6199

Publication date:
06/02/2018
A remote attacker could bypass the Sandstorm organization restriction before build 0.203 via a comma in an email-address field.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2018

CVE-2017-6200

Publication date:
06/02/2018
Sandstorm before build 0.203 allows remote attackers to read any specified file under /etc or /run via the sandbox backup function. The root cause is that the findFilesToZip function doesn't filter Line Feed (\n) characters in a directory name.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2018

CVE-2017-6201

Publication date:
06/02/2018
A Server Side Request Forgery vulnerability exists in the install app process in Sandstorm before build 0.203. A remote attacker may exploit this issue by providing a URL. It could bypass access control such as firewalls that prevent the attackers from accessing the URLs directly.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2018

CVE-2014-5280

Publication date:
06/02/2018
boot2docker 1.2 and earlier allows attackers to conduct cross-site request forgery (CSRF) attacks by leveraging Docker daemons enabling TCP connections without TLS authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2014-5282

Publication date:
06/02/2018
Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2014-5279

Publication date:
06/02/2018
The Docker daemon managed by boot2docker 1.2 and earlier improperly enables unauthenticated TCP connections by default, which makes it easier for remote attackers to gain privileges or execute arbitrary code from children containers.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-6288

Publication date:
06/02/2018
Cross-site Request Forgery leading to Administrative account takeover in Kaspersky Secure Mail Gateway version 1.1.
Severity CVSS v4.0: Pending analysis
Last modification:
01/03/2018

CVE-2018-6289

Publication date:
06/02/2018
Configuration file injection leading to Code Execution as Root in Kaspersky Secure Mail Gateway version 1.1.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2018

CVE-2018-6291

Publication date:
06/02/2018
WebConsole Cross-Site Scripting in Kaspersky Secure Mail Gateway version 1.1.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2018

CVE-2018-6290

Publication date:
06/02/2018
Local Privilege Escalation in Kaspersky Secure Mail Gateway version 1.1.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2017-7525

Publication date:
06/02/2018
A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023