Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2014-9819

Publication date:
30/03/2017
Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9823.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2014-9820

Publication date:
30/03/2017
Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pnm file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2014-9821

Publication date:
30/03/2017
Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted xpm file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2014-9822

Publication date:
30/03/2017
Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted quantum file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2014-9824

Publication date:
30/03/2017
Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9825.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2014-9823

Publication date:
30/03/2017
Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9819.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2014-9825

Publication date:
30/03/2017
Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9824.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2016-7541

Publication date:
30/03/2017
Long lived sessions in Fortinet FortiGate devices with FortiOS 5.x before 5.4.0 could violate a security policy during IPS signature updates when the FortiGate's IPSengine is configured in flow mode. All FortiGate versions with IPS configured in proxy mode (the default mode) are not affected.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2016-7542

Publication date:
30/03/2017
A read-only administrator on Fortinet devices with FortiOS 5.2.x before 5.2.10 GA and 5.4.x before 5.4.2 GA may have access to read-write administrators password hashes (not including super-admins) stored on the appliance via the webui REST API, and may therefore be able to crack them.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2017-7290

Publication date:
30/03/2017
SQL injection vulnerability in XOOPS 2.5.7.2 and other versions before 2.5.8.1 allows remote authenticated administrators to execute arbitrary SQL commands via the url parameter to findusers.php. An example attack uses "into outfile" to create a backdoor program.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2016-10308

Publication date:
30/03/2017
Siklu EtherHaul radios before 3.7.1 and 6.x before 6.9.0 have a built-in, hidden root account, with an unchangeable password that is the same across all devices. This account is accessible via both SSH and the device's web interface and grants access to the underlying embedded Linux OS on the device, allowing full control over it.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2016-10309

Publication date:
30/03/2017
In the GUI of Ceragon FibeAir IP-10 (before 7.2.0) devices, a remote attacker can bypass authentication by adding an ALBATROSS cookie with the value 0-4-11 to their browser.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026