Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2016-8656

Publication date:
22/05/2018
Jboss jbossas before versions 5.2.0-23, 6.4.13, 7.0.5 is vulnerable to an unsafe file handling in the jboss init script which could result in local privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2017-2609

Publication date:
22/05/2018
jenkins before versions 2.44, 2.32.2 is vulnerable to an information disclosure vulnerability in search suggestions (SECURITY-385). The autocomplete feature on the search box discloses the names of the views in its suggestions, including the ones for which the current user does not have access to.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2017-2617

Publication date:
22/05/2018
hawtio before version 1.5.5 is vulnerable to remote code execution via file upload. An attacker could use this vulnerability to upload a crafted file which could be executed on a target machine where hawtio is deployed.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2025

CVE-2018-11371

Publication date:
22/05/2018
SkyCaiji 1.2 allows CSRF to add an Administrator user.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2018

CVE-2018-11369

Publication date:
22/05/2018
An issue was discovered in PbootCMS v1.0.9. There is a SQL Injection that can get important information from the database via the \apps\home\controller\ParserController.php scode parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2018

CVE-2018-11321

Publication date:
22/05/2018
An issue was discovered in com_fields in Joomla! Core before 3.8.8. Inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2018

CVE-2018-11322

Publication date:
22/05/2018
An issue was discovered in Joomla! Core before 3.8.8. Depending on the server configuration, PHAR files might be handled as executable PHP scripts by the webserver.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2018

CVE-2018-11324

Publication date:
22/05/2018
An issue was discovered in Joomla! Core before 3.8.8. A long running background process, such as remote checks for core or extension updates, could create a race condition where a session that was expected to be destroyed would be recreated.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2018

CVE-2018-11326

Publication date:
22/05/2018
An issue was discovered in Joomla! Core before 3.8.8. Inadequate input filtering leads to a multiple XSS vulnerabilities. Additionally, the default filtering settings could potentially allow users of the default Administrator user group to perform a XSS attack.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2018

CVE-2018-11327

Publication date:
22/05/2018
An issue was discovered in Joomla! Core before 3.8.8. Inadequate checks allowed users to see the names of tags that were either unpublished or published with restricted view permission.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2018

CVE-2018-11328

Publication date:
22/05/2018
An issue was discovered in Joomla! Core before 3.8.8. Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could result in an XSS vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2018

CVE-2018-6378

Publication date:
22/05/2018
In Joomla! Core before 3.8.8, inadequate filtering of file and folder names leads to various XSS attack vectors in the media manager.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2018