Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2016-8637

Publication date:
01/08/2018
A local information disclosure issue was found in dracut before 045 when generating initramfs images with world-readable permissions when 'early cpio' is used, such as when including microcode updates. Local attacker can use this to obtain sensitive information from these files, such as encryption keys or credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2023

CVE-2016-8639

Publication date:
01/08/2018
It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code within the web interface.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2018-1999033

Publication date:
01/08/2018
An exposure of sensitive information vulnerability exists in Jenkins Anchore Container Image Scanner Plugin 10.16 and earlier in AnchoreBuilder.java that allows attackers with Item/ExtendedRead permission or file system access to the Jenkins master to obtain the password stored in this plugin's configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2019

CVE-2016-8634

Publication date:
01/08/2018
A vulnerability was found in foreman 1.14.0. When creating an organization or location in Foreman, if the name contains HTML then the second step of the wizard (/organizations/id/step2) will render the HTML. This occurs in the alertbox on the page. The result is a stored XSS attack if an organization/location with HTML in the name is created, then a user is linked directly to this URL.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2023

CVE-2018-14775

Publication date:
01/08/2018
tss_alloc in sys/arch/i386/i386/gdt.c in OpenBSD 6.2 and 6.3 has a Local Denial of Service (system crash) due to incorrect I/O port access control on the i386 architecture.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2018

CVE-2018-14776

Publication date:
01/08/2018
Click Studios Passwordstate before 8.3 Build 8397 allows XSS by authenticated users via an uploaded HTML document.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2018

CVE-2016-9573

Publication date:
01/08/2018
An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2023

CVE-2018-11050

Publication date:
01/08/2018
Dell EMC NetWorker versions between 9.0 and 9.1.1.8 through 9.2.1.3, and the version 18.1.0.1 contain a Clear-Text authentication over network vulnerability in the Rabbit MQ Advanced Message Queuing Protocol (AMQP) component. User credentials are sent unencrypted to the remote AMQP service. An unauthenticated attacker in the same network collision domain, could potentially sniff the password from the network and use it to access the component using the privileges of the compromised user.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2016-8615

Publication date:
01/08/2018
A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2016-8616

Publication date:
01/08/2018
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2016-8619

Publication date:
01/08/2018
The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2016-8620

Publication date:
01/08/2018
The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023