Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2014-0084

Publication date:
21/11/2019
Ruby gem openshift-origin-node before 2014-02-14 does not contain a cronjob timeout which could result in a denial of service in cron.daily and cron.weekly.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2023

CVE-2014-0083

Publication date:
21/11/2019
The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2020

CVE-2012-2350

Publication date:
21/11/2019
pam_shield before 0.9.4: Default configuration does not perform protective action
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2012-3543

Publication date:
21/11/2019
mono 2.10.x ASP.NET Web Form Hash collision DoS
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2013-7171

Publication date:
21/11/2019
Slackware 14.0 and 14.1, and Slackware LLVM 3.0-i486-2 and 3.3-i486-2, contain world-writable permissions on the /tmp directory which could allow remote attackers to execute arbitrary code with root privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2019

CVE-2013-7172

Publication date:
21/11/2019
Slackware 13.1, 13.37, 14.0 and 14.1 contain world-writable permissions on the iodbctest and iodbctestw programs within the libiodbc package, which could allow local users to use RPATH information to execute arbitrary code with root privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2019

CVE-2012-2238

Publication date:
21/11/2019
trytond 2.4: ModelView.button fails to validate authorization
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2019-19037

Publication date:
21/11/2019
ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
Severity CVSS v4.0: Pending analysis
Last modification:
05/12/2019

CVE-2019-19039

Publication date:
21/11/2019
__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because “1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024

CVE-2019-19036

Publication date:
21/11/2019
btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2020

CVE-2019-6853

Publication date:
20/11/2019
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2019

CVE-2019-6852

Publication date:
20/11/2019
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP hardcoded credentials when using the Web server of the controller on an unsecure network.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2019