Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-5455

Publication date:
11/06/2018
The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2017-5456

Publication date:
11/06/2018
A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2017-5450

Publication date:
11/06/2018
A mechanism to spoof the Firefox for Android addressbar using a "javascript:" URI. On Firefox for Android, the base domain is parsed incorrectly, making the resulting location less visibly a spoofed site and showing an incorrect domain in appended notifications. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
30/07/2018

CVE-2017-5458

Publication date:
11/06/2018
When a "javascript:" URL is drag and dropped by a user into the addressbar, the URL will be processed and executed. This allows for users to be socially engineered to execute an XSS attack on themselves. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2018

CVE-2017-5449

Publication date:
11/06/2018
A possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2018

CVE-2017-5451

Publication date:
11/06/2018
A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2018

CVE-2017-5454

Publication date:
11/06/2018
A mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2018

CVE-2017-5452

Publication date:
11/06/2018
Malicious sites can display a spoofed addressbar on a page when the existing location bar on the new page is scrolled out of view if an HTML editable page element is user selected. Note: This attack only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2018

CVE-2017-5453

Publication date:
11/06/2018
A mechanism to inject static HTML into the RSS reader preview page due to a failure to escape characters sent as URL parameters for a feed's "TITLE" element. This vulnerability allows for spoofing but no scripted content can be run. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2018

CVE-2017-5441

Publication date:
11/06/2018
A use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2024

CVE-2017-5442

Publication date:
11/06/2018
A use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2024

CVE-2017-5443

Publication date:
11/06/2018
An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives. This vulnerability affects Thunderbird
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2024