Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-28361

Publication date:
11/05/2023
A Cross-site WebSocket Hijacking (CSWSH) vulnerability found in UniFi OS 2.5 and earlier allows a malicious actor to access certain confidential information by persuading a UniFi OS user to visit a malicious webpage.Affected Products:Cloud Key Gen2Cloud Key Gen2 PlusUNVRUNVR ProfessionalUDMUDM ProfessionalUDM SEUDRMitigation:Update affected products to UniFi OS 3.0.13 or later.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2025

CVE-2023-28356

Publication date:
11/05/2023
A vulnerability has been identified where a maliciously crafted message containing a specific chain of characters can cause the chat to enter a hot loop on one of the processes, consuming ~120% CPU and rendering the service unresponsive.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2025

CVE-2023-28325

Publication date:
11/05/2023
An improper authorization vulnerability exists in Rocket.Chat
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2025

CVE-2023-28357

Publication date:
11/05/2023
A vulnerability has been identified in Rocket.Chat, where the ACL checks in the Slash Command /mute occur after checking whether a user is a member of a given channel, leaking private channel members to unauthorized users. This allows authenticated users to enumerate whether a username is a member of a channel that they do not have access to.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2025

CVE-2023-28358

Publication date:
11/05/2023
A vulnerability has been discovered in Rocket.Chat where a markdown parsing issue in the "Search Messages" feature allows the insertion of malicious tags. This can be exploited on servers with content security policy disabled possible leading to some issues attacks like account takeover.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2025

CVE-2023-31497

Publication date:
11/05/2023
Incorrect access control in Quick Heal Technologies Limited Seqrite Endpoint Security (EPS) all versions prior to v8.0 allows attackers to escalate privileges to root via supplying a crafted binary to the target system.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2025

CVE-2023-2664

Publication date:
11/05/2023
 In Xpdf 4.04 (and earlier), a PDF object loop in the embedded file tree leads to infinite recursion and a stack overflow.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2023

CVE-2023-2663

Publication date:
11/05/2023
 In Xpdf 4.04 (and earlier), a PDF object loop in the page label tree leads to infinite recursion and a stack overflow.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025

CVE-2023-31146

Publication date:
11/05/2023
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, during codegen, the length word of a dynarray is written before the data, which can result in out-of-bounds array access in the case where the dynarray is on both the lhs and rhs of an assignment. The issue can cause data corruption across call frames. The expected behavior is to revert due to out-of-bounds array access. Version 0.3.8 contains a patch for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025

CVE-2023-32058

Publication date:
11/05/2023
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, due to missing overflow check for loop variables, by assigning the iterator of a loop to a variable, it is possible to overflow the type of the latter. The issue seems to happen only in loops of type `for i in range(a, a + N)` as in loops of type `for i in range(start, stop)` and `for i in range(stop)`, the compiler is able to raise a `TypeMismatch` when trying to overflow the variable. The problem has been patched in version 0.3.8.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025

CVE-2023-2662

Publication date:
11/05/2023
In Xpdf 4.04 (and earlier), a bad color space object in the input PDF file can cause a divide-by-zero.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025

CVE-2023-29791

Publication date:
11/05/2023
kodbox
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025