Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-7321

Publication date:
30/03/2017
setup/controllers/welcome.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the config_key parameter to the setup/index.php?action=welcome URI.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-7322

Publication date:
30/03/2017
The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code via a crafted certificate.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-7323

Publication date:
30/03/2017
The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-7324

Publication date:
30/03/2017
setup/templates/findcore.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the core_path parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-10305

Publication date:
30/03/2017
Trango Apex
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-10307

Publication date:
30/03/2017
Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-7318

Publication date:
30/03/2017
Siklu EtherHaul devices before 7.4.0 are vulnerable to a remote command execution (RCE) vulnerability. This vulnerability allows a remote attacker to execute commands and retrieve information such as usernames and plaintext passwords from the device with no authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-7310

Publication date:
29/03/2017
A buffer overflow vulnerability in Import Command in SyncBreeze before 10.6, DiskSorter before 10.6, DiskBoss before 8.9, DiskPulse before 10.6, DiskSavvy before 10.6, DupScout before 10.6, and VX Search before 10.6 allows attackers to execute arbitrary code via a crafted XML file containing a long name attribute of a classify element.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-4977

Publication date:
29/03/2017
EMC RSA Archer Security Operations Management with RSA Unified Collector Framework versions prior to 1.3.1.52 contain a sensitive information disclosure vulnerability that could potentially be exploited by malicious users to compromise an affected system.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-4980

Publication date:
29/03/2017
EMC Isilon OneFS is affected by a path traversal vulnerability that may potentially be exploited by attackers to compromise the affected system. Affected versions are 7.1.0 - 7.1.1.10, 7.2.0 - 7.2.1.3, and 8.0.0 - 8.0.0.1.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2014-3582

Publication date:
29/03/2017
In Ambari 1.2.0 through 2.2.2, it may be possible to execute arbitrary system commands on the Ambari Server host while generating SSL certificates for hosts in an Ambari cluster.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-6349

Publication date:
29/03/2017
The machinectl command in oci-register-machine allows local users to list running containers and possibly obtain sensitive information by running that command.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025