Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-4928

Publication date:
17/11/2017
The flash-based vSphere Web Client (6.0 prior to 6.0 U3c and 5.5 prior to 5.5 U3f) i.e. not the new HTML5-based vSphere Client, contains SSRF and CRLF injection issues due to improper neutralization of URLs. An attacker may exploit these issues by sending a POST request with modified headers towards internal services leading to information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-10888

Publication date:
17/11/2017
BOOK WALKER for Windows Ver.1.2.9 and earlier, BOOK WALKER for Mac Ver.1.2.5 and earlier allow an attacker to access local files via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-16868

Publication date:
17/11/2017
In SWFTools 0.9.2, the wav_convert2mono function in lib/wav.c does not properly restrict a multiplication within a malloc call, which allows remote attackers to cause a denial of service (integer overflow and NULL pointer dereference) via a crafted WAV file.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-16869

Publication date:
17/11/2017
p_mach.cpp in UPX 3.94 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted Mach-O file, related to canPack and unpack functions. NOTE: the vendor has stated "there is no security implication whatsoever.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-16870

Publication date:
17/11/2017
The UpdraftPlus plugin through 1.13.12 for WordPress has SSRF in the updraft_ajax_handler function in /wp-content/plugins/updraftplus/admin.php via an httpget subaction. NOTE: the vendor reports that this does not cross a privilege boundary
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-16871

Publication date:
17/11/2017
The UpdraftPlus plugin through 1.13.12 for WordPress allows remote PHP code execution because the plupload_action function in /wp-content/plugins/updraftplus/admin.php has a race condition before deleting a file associated with the name parameter. NOTE: the vendor reports that this does not cross a privilege boundary
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-16872

Publication date:
17/11/2017
An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-1000129

Publication date:
17/11/2017
Serendipity 2.0.3 is vulnerable to a SQL injection in the blog component resulting in information disclosure
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-1000164

Publication date:
17/11/2017
Tine 2.0 version 2017.02.4 is vulnerable to XSS in the Addressbook resulting code execution and privilege escalation
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-1000223

Publication date:
17/11/2017
A stored web content injection vulnerability (WCI, a.k.a XSS) is present in MODX Revolution CMS version 2.5.6 and earlier. An authenticated user with permissions to edit users can save malicious JavaScript as a User Group name and potentially take control over victims' accounts. This can lead to an escalation of privileges providing complete administrative control over the CMS.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-1000225

Publication date:
17/11/2017
Reflected XSS in Relevanssi Premium version 1.14.8 when using relevanssi_didyoumean() could allow unauthenticated attacker to do almost anything an admin can
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-1000226

Publication date:
17/11/2017
Stop User Enumeration 1.3.8 allows user enumeration via the REST API
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025