Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-8440

Publication date:
05/06/2017
Starting in version 5.3.0, Kibana had a cross-site scripting (XSS) vulnerability in the Discover page that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8438

Publication date:
05/06/2017
Elastic X-Pack Security versions 5.0.0 to 5.4.0 contain a privilege escalation bug in the run_as functionality. This bug prevents transitioning into the specified user specified in a run_as request. If a role has been created using a template that contains the _user properties, the behavior of run_as will be incorrect. Additionally if the run_as user specified does not exist, the transition will not happen.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8441

Publication date:
05/06/2017
Elastic X-Pack Security versions prior to 5.4.1 and 5.3.3 did not always correctly apply Document Level Security to index aliases. This bug could allow a user with restricted permissions to view data they should not have access to when performing certain operations against an index alias.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-9430

Publication date:
05/06/2017
Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-9431

Publication date:
05/06/2017
Google gRPC before 2017-04-05 has an out-of-bounds write caused by a heap-based buffer overflow related to core/lib/iomgr/error.c.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-9432

Publication date:
05/06/2017
Document Liberation Project libstaroffice before 2017-04-07 has an out-of-bounds write caused by a stack-based buffer overflow related to the DatabaseName::read function in lib/StarWriterStruct.cxx.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-9433

Publication date:
05/06/2017
Document Liberation Project libmwaw before 2017-04-08 has an out-of-bounds write caused by a heap-based buffer overflow related to the MsWrd1Parser::readFootnoteCorrespondance function in lib/MsWrd1Parser.cxx.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-7669

Publication date:
05/06/2017
In Apache Hadoop 2.8.0, 3.0.0-alpha1, and 3.0.0-alpha2, the LinuxContainerExecutor runs docker commands as root with insufficient input validation. When the docker feature is enabled, authenticated users can run commands as root.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-9428

Publication date:
04/06/2017
A directory traversal vulnerability exists in core\admin\ajax\developer\extensions\file-browser.php in BigTree CMS through 4.2.18 on Windows, allowing attackers to read arbitrary files via ..\ sequences in the directory parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-9427

Publication date:
04/06/2017
SQL injection vulnerability in BigTree CMS through 4.2.18 allows remote authenticated users to execute arbitrary SQL commands via core\admin\modules\developer\modules\designer\form-create.php. The attacker creates a crafted table name at admin/developer/modules/designer/ and the injection is visible at admin/dashboard/vitals-statistics/integrity/check/?external=true.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2014-9983

Publication date:
04/06/2017
Directory Traversal exists in RAR 4.x and 5.x because an unpack operation follows any symlinks, including symlinks contained in the archive. This allows remote attackers to write to arbitrary files via a crafted archive.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2012-6705

Publication date:
04/06/2017
Cross Site Scripting (XSS) exists in Jamroom before 4.2.7 via the Status Update field.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025