Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-17043

Publication date:
28/11/2017
The Emag Marketplace Connector plugin 1.0.0 for WordPress has reflected XSS because the parameter "post" to /wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php is not filtered correctly.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-17042

Publication date:
28/11/2017
lib/yard/core_ext/file.rb in the server in YARD before 0.9.11 does not block relative paths with an initial ../ sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-9315

Publication date:
28/11/2017
Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-15673

Publication date:
28/11/2017
The files function in the administration section in CS-Cart 4.6.2 and earlier allows attackers to execute arbitrary PHP code via vectors involving a custom page.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-16952

Publication date:
28/11/2017
KMPlayer 4.2.2.4 allows remote attackers to cause a denial of service via a crafted NSV file.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-16951

Publication date:
28/11/2017
Winamp Pro 5.66 Build 3512 allows remote attackers to cause a denial of service via a crafted WAV, WMV, AU, ASF, AIFF, or AIF file.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-14379

Publication date:
28/11/2017
EMC RSA Authentication Manager before 8.2 SP1 P6 has a cross-site scripting vulnerability that could potentially be exploited by malicious users to compromise the affected system.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-10702

Publication date:
28/11/2017
Pebble Smartwatch devices through 4.3 mishandle UUID storage, which allows attackers to read an arbitrary application's flash storage, and access an arbitrary application's JavaScript instance, by modifying a UUID value within the header of a crafted application binary.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8020

Publication date:
28/11/2017
An issue was discovered in EMC ScaleIO 2.0.1.x. A buffer overflow vulnerability in the SDBG service may potentially allow a remote unauthenticated attacker to execute arbitrary commands with root privileges on an affected server.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8019

Publication date:
28/11/2017
An issue was discovered in EMC ScaleIO 2.0.1.x. A vulnerability in message parsers (MDM, SDS, and LIA) could potentially allow an unauthenticated remote attacker to send specifically crafted packets to stop ScaleIO services and cause a denial of service situation.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8001

Publication date:
28/11/2017
An issue was discovered in EMC ScaleIO 2.0.1.x. In a Linux environment, one of the support scripts saves the credentials of the ScaleIO MDM user who executed the script in clear text in temporary log files. The temporary files may potentially be read by an unprivileged user with access to the server where the script was executed to recover exposed credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-14389

Publication date:
28/11/2017
An issue was discovered in Cloud Foundry Foundation capi-release (all versions prior to 1.45.0), cf-release (all versions prior to v280), and cf-deployment (all versions prior to v1.0.0). The Cloud Controller does not prevent space developers from creating subdomains to an already existing route that belongs to a different user in a different org and space, aka an "Application Subdomain Takeover."
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025