Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2016-8386

Publication date:
27/02/2017
An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a PDF containing a malformed font to XML, the tool will attempt to use a size out of the font to search through a linked list of buffers to return. Due to a signedness issue, a buffer smaller than the requested size will be returned. Later when the tool tries to populate this buffer, the overflow will occur which can lead to code execution under the context of the user running the tool.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-8387

Publication date:
27/02/2017
An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF with an object encoded w/ multiple encoding types terminating with an LZW encoded type, an overflow may occur due to a lack of bounds checking by the LZW decoder. This can lead to code execution under the context of the account of the user running it.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-8105

Publication date:
27/02/2017
Drivers for the Intel Ethernet Controller X710 and Intel Ethernet Controller XL710 families before version 22.0 are vulnerable to a denial of service in certain layer 2 network configurations.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-8509

Publication date:
27/02/2017
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2016-8510

Publication date:
27/02/2017
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2017-2682

Publication date:
27/02/2017
The Siemens web application RUGGEDCOM NMS
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-2683

Publication date:
27/02/2017
A non-privileged user of the Siemens web application RUGGEDCOM NMS
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-5925

Publication date:
27/02/2017
Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern Intel processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-5926

Publication date:
27/02/2017
Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern AMD processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-5927

Publication date:
27/02/2017
Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern ARM processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-6344

Publication date:
27/02/2017
XML External Entity (XXE) vulnerability in Grails PDF Plugin 0.6 allows remote attackers to read arbitrary files via a crafted XML document.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-6349

Publication date:
27/02/2017
An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025