Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-14094

Publication date:
19/01/2018
A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a cron job injection on a vulnerable system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2017-14095

Publication date:
19/01/2018
A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a local file inclusion on a vulnerable system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2017-11398

Publication date:
19/01/2018
A session hijacking via log disclosure vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an unauthenticated attacker to hijack active user sessions to perform authenticated requests on a vulnerable system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2019

CVE-2017-7326

Publication date:
19/01/2018
Race condition issue in Yandex Browser for Android before 17.4.0.16 allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2018

CVE-2017-7327

Publication date:
19/01/2018
Yandex Browser installer for Desktop before 17.4.1 has a DLL Hijacking Vulnerability because an untrusted search path is used for dnsapi.dll, winmm.dll, ntmarta.dll, cryptbase.dll or profapi.dll.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2018

CVE-2017-15713

Publication date:
19/01/2018
Vulnerability in Apache Hadoop 0.23.x, 2.x before 2.7.5, 2.8.x before 2.8.3, and 3.0.0-alpha through 3.0.0-beta1 allows a cluster user to expose private files owned by the user running the MapReduce job history server process. The malicious user can construct a configuration file containing XML directives that reference sensitive files on the MapReduce job history server host.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2017-7325

Publication date:
19/01/2018
Yandex Browser before 16.9.0 allows remote attackers to spoof the address bar via window.open.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2018

CVE-2017-18044

Publication date:
19/01/2018
A Command Injection issue was discovered in ContentStore/Base/CVDataPipe.dll in Commvault before v11 SP6. A certain message parsing function inside the Commvault service does not properly validate the input of an incoming string before passing it to CreateProcess. As a result, a specially crafted message can inject commands that will be executed on the target operating system. Exploitation of this vulnerability does not require authentication and can lead to SYSTEM level privilege on any system running the cvd daemon. This is a different vulnerability than CVE-2017-3195.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2019

CVE-2014-4919

Publication date:
19/01/2018
OXID eShop Professional Edition before 4.7.13 and 4.8.x before 4.8.7, Enterprise Edition before 5.0.13 and 5.1.x before 5.1.7, and Community Edition before 4.7.13 and 4.8.x before 4.8.7 allow remote attackers to assign users to arbitrary dynamical user groups.
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2021

CVE-2015-6926

Publication date:
19/01/2018
The OpenID Single Sign-On authentication functionality in OXID eShop before 4.5.0 allows remote attackers to impersonate users via the email address in a crafted authentication token.
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2021

CVE-2017-1693

Publication date:
19/01/2018
IBM Integration Bus 9.0 and 10.0 could allow an attacker that has captured a valid session id to hijack another users session during a small timeframe before the session times out. IBM X-Force ID: 134164.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2018

CVE-2017-6142

Publication date:
19/01/2018
X509 certificate verification was not correctly implemented in the early access "user id" feature in the F5 BIG-IP Advanced Firewall Manager versions 13.0.0, 12.1.0-12.1.2, and 11.6.0-11.6.2, and thus did not properly validate the remote server's identity on certain versions of BIG-IP.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2018