Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2017-5152

Publication date:
13/02/2017
An issue was discovered in Advantech WebAccess Version 8.1. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access pages unrestricted (AUTHENTICATION BYPASS).
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-5154

Publication date:
13/02/2017
An issue was discovered in Advantech WebAccess Version 8.1. To be able to exploit the SQL injection vulnerability, an attacker must supply malformed input to the WebAccess software. Successful attack could result in administrative access to the application and its data files.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-5151

Publication date:
13/02/2017
An issue was discovered in VideoInsight Web Client Version 6.3.5.11 and previous versions. A SQL Injection vulnerability has been identified, which may allow remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-5157

Publication date:
13/02/2017
An issue was discovered in Schneider Electric homeLYnk Controller, LSS100100, all versions prior to V1.5.0. The homeLYnk controller is susceptible to a cross-site scripting attack. User inputs can be manipulated to cause execution of JavaScript code.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2017-5159

Publication date:
13/02/2017
An issue was discovered on Phoenix Contact mGuard devices that have been updated to Version 8.4.0. When updating an mGuard device to Version 8.4.0 via the update-upload facility, the update will succeed, but it will reset the password of the admin user to its default value.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-9349

Publication date:
13/02/2017
An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. An attacker could traverse the file system and extract files that can result in information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-9351

Publication date:
13/02/2017
An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The directory traversal/file upload error allows an attacker to upload and unpack a zip file.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-8376

Publication date:
13/02/2017
An issue was discovered in Kabona AB WebDatorCentral (WDC) application prior to Version 3.4.0. This non-validated redirect/non-validated forward (OPEN REDIRECT) allows chaining with authenticated vulnerabilities.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-9353

Publication date:
13/02/2017
An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The admin password is stored in the system and is encrypted with a static key hard-coded in the program. Attackers could reverse the admin account password for use.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-8361

Publication date:
13/02/2017
An issue was discovered in Lynxspring JENEsys BAS Bridge versions 1.1.8 and older. The application uses a hard-coded username with no password allowing an attacker into the system without authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-8378

Publication date:
13/02/2017
An issue was discovered in Lynxspring JENEsys BAS Bridge versions 1.1.8 and older. The application's database lacks sufficient safeguards for protecting credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025

CVE-2016-8369

Publication date:
13/02/2017
An issue was discovered in Lynxspring JENEsys BAS Bridge versions 1.1.8 and older. The application does not sufficiently verify if a request was intentionally provided by the user who submitted the request (CROSS-SITE REQUEST FORGERY).
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2025