Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-14082

Publication date:
19/01/2018
An uninitialized pointer information disclosure vulnerability in Trend Micro Mobile Security (Enterprise) versions 9.7 and below could allow an unauthenticated remote attacker to disclosure sensitive information on a vulnerable system.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2018

CVE-2017-14097

Publication date:
19/01/2018
An improper access control vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to decrypt contents of a database with information that could be used to access a vulnerable system.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2017-12098

Publication date:
19/01/2018
An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2023

CVE-2017-14094

Publication date:
19/01/2018
A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a cron job injection on a vulnerable system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2017-14095

Publication date:
19/01/2018
A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a local file inclusion on a vulnerable system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2017-11398

Publication date:
19/01/2018
A session hijacking via log disclosure vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an unauthenticated attacker to hijack active user sessions to perform authenticated requests on a vulnerable system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2017-7326

Publication date:
19/01/2018
Race condition issue in Yandex Browser for Android before 17.4.0.16 allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2018

CVE-2017-7327

Publication date:
19/01/2018
Yandex Browser installer for Desktop before 17.4.1 has a DLL Hijacking Vulnerability because an untrusted search path is used for dnsapi.dll, winmm.dll, ntmarta.dll, cryptbase.dll or profapi.dll.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2018

CVE-2017-15713

Publication date:
19/01/2018
Vulnerability in Apache Hadoop 0.23.x, 2.x before 2.7.5, 2.8.x before 2.8.3, and 3.0.0-alpha through 3.0.0-beta1 allows a cluster user to expose private files owned by the user running the MapReduce job history server process. The malicious user can construct a configuration file containing XML directives that reference sensitive files on the MapReduce job history server host.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2017-7325

Publication date:
19/01/2018
Yandex Browser before 16.9.0 allows remote attackers to spoof the address bar via window.open.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2018

CVE-2017-18044

Publication date:
19/01/2018
A Command Injection issue was discovered in ContentStore/Base/CVDataPipe.dll in Commvault before v11 SP6. A certain message parsing function inside the Commvault service does not properly validate the input of an incoming string before passing it to CreateProcess. As a result, a specially crafted message can inject commands that will be executed on the target operating system. Exploitation of this vulnerability does not require authentication and can lead to SYSTEM level privilege on any system running the cvd daemon. This is a different vulnerability than CVE-2017-3195.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2014-4919

Publication date:
19/01/2018
OXID eShop Professional Edition before 4.7.13 and 4.8.x before 4.8.7, Enterprise Edition before 5.0.13 and 5.1.x before 5.1.7, and Community Edition before 4.7.13 and 4.8.x before 4.8.7 allow remote attackers to assign users to arbitrary dynamical user groups.
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2021