Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-48502

Publication date:
31/05/2023
An issue was discovered in the Linux kernel before 6.2. The ntfs3 subsystem does not properly check for correctness during disk reads, leading to an out-of-bounds read in ntfs_set_ea in fs/ntfs3/xattr.c.
Severity CVSS v4.0: Pending analysis
Last modification:
15/12/2023

CVE-2021-45039

Publication date:
31/05/2023
Multiple models of the Uniview IP Camera (e.g., IPC_G6103 B6103.16.10.B25.201218, IPC_G61, IPC21, IPC23, IPC32, IPC36, IPC62, and IPC_HCMN) offer an undocumented UDP service on port 7788 that allows a remote unauthenticated attacker to overflow an internal buffer and achieve code execution. By using this buffer overflow, a remote attacker can start the telnetd service. This service has a hardcoded default username and password (root/123456). Although it has a restrictive shell, this can be easily bypassed via the built-in ECHO shell command.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-34256

Publication date:
31/05/2023
An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access.
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2025

CVE-2023-34088

Publication date:
31/05/2023
Collabora Online is a collaborative online office suite. A stored cross-site scripting (XSS) vulnerability was found in Collabora Online prior to versions 22.05.13, 21.11.9.1, and 6.4.27. An attacker could create a document with an XSS payload as a document name. Later, if an administrator opened the admin console and navigated to the history page, the document name was injected as unescaped HTML and executed as a script inside the context of the admin console. The administrator JSON web token (JWT) used for the websocket connection could be leaked through this flaw. Users should upgrade to Collabora Online 22.05.13 or higher; Collabora Online 21.11.9.1 or higher; Collabora Online 6.4.27 or higher to receive a patch.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2023

CVE-2023-33722

Publication date:
31/05/2023
EDIMAX BR-6288ACL v1.12 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the pppUserName parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-33979

Publication date:
31/05/2023
gpt_academic provides a graphical interface for ChatGPT/GLM. A vulnerability was found in gpt_academic 3.37 and prior. This issue affects some unknown processing of the component Configuration File Handler. The manipulation of the argument file leads to information disclosure. Since no sensitive files are configured to be off-limits, sensitive information files in some working directories can be read through the `/file` route, leading to sensitive information leakage. This affects users that uses file configurations via `config.py`, `config_private.py`, `Dockerfile`. A patch is available at commit 1dcc2873d2168ad2d3d70afcb453ac1695fbdf02. As a workaround, one may use environment variables instead of `config*.py` files to configure this project, or use docker-compose installation to configure this project.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2025

CVE-2023-33718

Publication date:
31/05/2023
mp4v2 v2.1.3 was discovered to contain a memory leak via MP4File::ReadString() at mp4file_io.cpp
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-26277

Publication date:
31/05/2023
IBM QRadar WinCollect Agent 10.0 though 10.1.3 could allow a local user to execute commands on the system due to execution with unnecessary privileges. IBM X-Force ID: 248156.
Severity CVSS v4.0: Pending analysis
Last modification:
07/06/2023

CVE-2022-35759

Publication date:
31/05/2023
Windows Local Security Authority (LSA) Denial of Service Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
07/06/2023

CVE-2022-35756

Publication date:
31/05/2023
Windows Kerberos Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
07/06/2023

CVE-2022-35757

Publication date:
31/05/2023
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
07/06/2023

CVE-2022-35755

Publication date:
31/05/2023
Windows Print Spooler Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
07/06/2023