Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-11455

Publication date:
22/04/2019
A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit before 5.25.3 allows a remote authenticated attacker to retrieve the contents of adjacent memory via manipulation of GET or POST parameters. The attacker can also cause a denial of service (application outage).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-3899

Publication date:
22/04/2019
It was found that default configuration of Heketi does not require any authentication potentially exposing the management interface to misuse. This isue only affects heketi as shipped with Openshift Container Platform 3.11.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2023

CVE-2019-3901

Publication date:
22/04/2019
A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2023

CVE-2016-1584

Publication date:
22/04/2019
In all versions of Unity8 a running but not active application on a large-screen device could talk with Maliit and consume keyboard input.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-1586

Publication date:
22/04/2019
A malicious webview could install long-lived unload handlers that re-use an incognito BrowserContext that is queued for destruction in versions of Oxide before 1.18.3.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-1587

Publication date:
22/04/2019
The Snapweb interface before version 0.21.2 was exposing controls to install or remove snap packages without controlling the identity of the user, nor the origin of the connection. An attacker could have used the controls to remotely add a valid, but malicious, snap package, from the Store, potentially using system resources without permission from the legitimate administrator of the system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2016-1579

Publication date:
22/04/2019
UDM provides support for running commands after a download is completed, this is currently made use of for click package installation. This functionality was not restricted to unconfined applications. Before UDM version 1.2+16.04.20160408-0ubuntu1 any confined application could make use of the UDM C++ API to run arbitrary commands in an unconfined environment as the phablet user.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2015-1343

Publication date:
22/04/2019
All versions of unity-scope-gdrive logs search terms to syslog.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2019-11456

Publication date:
22/04/2019
Gila CMS 1.10.1 allows fm/save CSRF for executing arbitrary PHP code.
Severity CVSS v4.0: Pending analysis
Last modification:
26/04/2019

CVE-2016-1573

Publication date:
22/04/2019
Versions of Unity8 before 8.11+16.04.20160122-0ubuntu1 file plugins/Dash/CardCreator.js will execute any code found in place of a fallback image supplied by a scope.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2020

CVE-2019-3902

Publication date:
22/04/2019
A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subrepositories to defeat Mercurial's path-checking logic and write files outside a repository.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2020

CVE-2019-6155

Publication date:
22/04/2019
A potential vulnerability was found in an SMI handler in various BIOS versions of certain legacy IBM System x and IBM BladeCenter systems that could lead to denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2020