Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-40046

Publication date:
27/09/2023
<br /> <br /> <br /> In WS_FTP Server versions prior to 8.7.4 and 8.8.2,<br /> <br /> a SQL injection vulnerability exists in the WS_FTP Server manager interface. An attacker may be able to infer information about the structure and contents of the database and execute SQL statements that alter or delete database elements.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2023

CVE-2023-40047

Publication date:
27/09/2023
<br /> <br /> <br /> In WS_FTP Server version prior to 8.8.2, a stored cross-site scripting (XSS) vulnerability exists in WS_FTP Server&amp;#39;s Management module. An attacker with administrative privileges could import a SSL certificate with malicious attributes containing cross-site scripting payloads.  Once the cross-site scripting payload is successfully stored,  an attacker could leverage this vulnerability to target WS_FTP Server admins with a specialized payload which results in the execution of malicious JavaScript within the context of the victims browser.<br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2023

CVE-2023-40045

Publication date:
27/09/2023
<br /> <br /> <br /> In WS_FTP Server versions prior to 8.7.4 and 8.8.2,<br /> <br /> a reflected cross-site scripting (XSS) vulnerability exists in WS_FTP Server&amp;#39;s Ad Hoc Transfer module.  An attacker could leverage this vulnerability to target WS_FTP Server users with a specialized payload which results in the execution of malicious JavaScript within the context of the victims browser.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2023

CVE-2023-40044

Publication date:
27/09/2023
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2023-39377

Publication date:
27/09/2023
SiberianCMS - CWE-434: Unrestricted Upload of File with Dangerous Type - A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2023

CVE-2023-39378

Publication date:
27/09/2023
SiberianCMS - CWE-89: Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) by an unauthenticated user
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2023

CVE-2023-3767

Publication date:
27/09/2023
An OS command injection vulnerability has been found on EasyPHP Webserver affecting version 14.1. This vulnerability could allow an attacker to get full access to the system by sending a specially crafted exploit to the /index.php?zone=settings parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2023

CVE-2023-39434

Publication date:
27/09/2023
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2023-3223

Publication date:
27/09/2023
A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it&amp;#39;s possible to bypass the limit by setting the file name in the request to null.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2024

CVE-2023-39375

Publication date:
27/09/2023
<br /> SiberianCMS - CWE-274: Improper Handling of Insufficient Privileges<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2023

CVE-2023-39376

Publication date:
27/09/2023
<br /> SiberianCMS - CWE-284 Improper Access Control Authorized user may disable a security feature over the network<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2023

CVE-2023-39347

Publication date:
27/09/2023
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An attacker with the ability to update pod labels can cause Cilium to apply incorrect network policies. This issue arises due to the fact that on pod update, Cilium incorrectly uses user-provided pod labels to select the policies which apply to the workload in question. This can affect Cilium network policies that use the namespace, service account or cluster constructs to restrict traffic, Cilium clusterwide network policies that use Cilium namespace labels to select the Pod and Kubernetes network policies. Non-existent construct names can be provided, which bypass all network policies applicable to the construct. For example, providing a pod with a non-existent namespace as the value of the `io.kubernetes.pod.namespace` label results in none of the namespaced CiliumNetworkPolicies applying to the pod in question. This attack requires the attacker to have Kubernetes API Server access, as described in the Cilium Threat Model. This issue has been resolved in: Cilium versions 1.14.2, 1.13.7, and 1.12.14. Users are advised to upgrade. As a workaround an admission webhook can be used to prevent pod label updates to the `k8s:io.kubernetes.pod.namespace` and `io.cilium.k8s.policy.*` keys.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2023