Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-17734

Publication date:
18/12/2017
CMS Made Simple (CMSMS) before 2.2.5 does not properly cache login information in sessions.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-17735

Publication date:
18/12/2017
CMS Made Simple (CMSMS) before 2.2.5 does not properly cache login information in cookies.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-17737

Publication date:
18/12/2017
The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has XSS via the REF parameter to /network_diagnostics.html or /storage_info.html.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-17739

Publication date:
18/12/2017
The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has directory traversal via the /storage.html rp parameter, allowing an attacker to read or write to files.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-17738

Publication date:
18/12/2017
The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) allows renaming and modifying files via /tools.html.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-17740

Publication date:
18/12/2017
contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-17727

Publication date:
18/12/2017
DedeCMS through 5.6 allows arbitrary file upload and PHP code execution by embedding the PHP code in a .jpg file, which is used in the templet parameter to member/article_edit.php.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-17730

Publication date:
18/12/2017
DedeCMS through 5.7 has SQL Injection via the logo parameter to plus/flink_add.php.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-17731

Publication date:
18/12/2017
DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-17733

Publication date:
18/12/2017
Maccms 8.x allows remote command execution via the wd parameter in an index.php?m=vod-search request.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-16997

Publication date:
18/12/2017
elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-17718

Publication date:
17/12/2017
The Net::LDAP (aka net-ldap) gem before 0.16.0 for Ruby has Missing SSL Certificate Validation.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026