Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-8790

Publication date:
05/05/2017
An issue was discovered on Accellion FTA devices before FTA_9_12_180. The home/seos/courier/ldaptest.html POST parameter "filter" can be used for LDAP Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8760

Publication date:
05/05/2017
An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is XSS in courier/1000@/index.html with the auth_params parameter. The device tries to use internal WAF filters to stop specific XSS Vulnerabilities. However, these can be bypassed by using some modifications to the payloads, e.g., URL encoding.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8304

Publication date:
05/05/2017
An issue was discovered on Accellion FTA devices before FTA_9_12_180. courier/1000@/oauth/playground/callback.html allows XSS with a crafted URI.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8789

Publication date:
05/05/2017
An issue was discovered on Accellion FTA devices before FTA_9_12_180. A report_error.php?year='payload SQL injection vector exists.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8796

Publication date:
05/05/2017
An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because mysql_real_escape_string is misused, seos/courier/communication_p2p.php allows SQL injection with the app_id parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8791

Publication date:
05/05/2017
An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is a home/seos/courier/login.html auth_params CRLF attack vector.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8794

Publication date:
05/05/2017
An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because a regular expression (intended to match local https URLs) lacks an initial ^ character, courier/web/1000@/wmProgressval.html allows SSRF attacks with a file:///etc/passwd#https:// URL pattern.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8788

Publication date:
05/05/2017
An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is a CRLF vulnerability in settings_global_text_edit.php allowing ?display=x%0Dnewline attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8303

Publication date:
05/05/2017
An issue was discovered on Accellion FTA devices before FTA_9_12_180. seos/1000/find.api allows Remote Code Execution with shell metacharacters in the method parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8793

Publication date:
05/05/2017
An issue was discovered on Accellion FTA devices before FTA_9_12_180. By sending a POST request to home/seos/courier/web/wmProgressstat.html.php with an attacker domain in the acallow parameter, the device will respond with an Access-Control-Allow-Origin header allowing the attacker to have site access with a bypass of the Same Origin Policy.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8799

Publication date:
05/05/2017
Untrusted input execution via igetwild in all iRODS versions before 4.1.11 and 4.2.1 allows other iRODS users (potentially anonymous) to execute remote shell commands via iRODS virtual pathnames. To exploit this vulnerability, a virtual iRODS pathname that includes a semicolon would be retrieved via igetwild. Because igetwild is a Bash script, the part of the pathname following the semicolon would be executed in the user's shell.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-8080

Publication date:
05/05/2017
Atlassian Hipchat Server before 2.2.4 allows remote authenticated users with user level privileges to execute arbitrary code via vectors involving image uploads.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025