Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-37172

Publication date:
07/07/2023
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the ip parameter in the setDiagnosisCfg function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2023

CVE-2023-37173

Publication date:
07/07/2023
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the command parameter in the setTracerouteCfg function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2023

CVE-2022-4361

Publication date:
07/07/2023
Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri.
Severity CVSS v4.0: Pending analysis
Last modification:
17/07/2023

CVE-2023-20133

Publication date:
07/07/2023
A vulnerability in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.<br /> <br /> This vulnerability exists because of insufficient validation of user-supplied input in Webex Events (classic) programs, email templates, and survey questions. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Severity CVSS v4.0: Pending analysis
Last modification:
25/01/2024

CVE-2023-20180

Publication date:
07/07/2023
A vulnerability in the web interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.<br /> <br /> This vulnerability is due to insufficient CSRF protections for the web interface on an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions. These actions could include joining meetings and scheduling training sessions.
Severity CVSS v4.0: Pending analysis
Last modification:
08/02/2024

CVE-2021-32494

Publication date:
07/07/2023
Radare2 has a division by zero vulnerability in Mach-O parser&amp;#39;s rebase_buffer function. This allow attackers to create malicious inputs that can cause denial of service.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2023

CVE-2023-36992

Publication date:
07/07/2023
PHP injection in TravianZ 8.3.4 and 8.3.3 in the config editor in the admin page allows remote attackers to execute PHP code.
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2023

CVE-2021-39014

Publication date:
07/07/2023
IBM Cloud Object System 3.15.8.97 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 213650.
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2023

CVE-2021-32495

Publication date:
07/07/2023
Radare2 has a use-after-free vulnerability in pyc parser&amp;#39;s get_none_object function. Attacker can read freed memory afterwards. This will allow attackers to cause denial of service.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2023

CVE-2023-36993

Publication date:
07/07/2023
The cryptographically insecure random number generator being used in TravianZ 8.3.4 and 8.3.3 in the password reset function allows an attacker to guess the password reset.parameters and to take over accounts.
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2023

CVE-2023-36994

Publication date:
07/07/2023
In TravianZ 8.3.4 and 8.3.3, Incorrect Access Control in the installation script allows an attacker to overwrite the server configuration and inject PHP code.
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2023

CVE-2021-33798

Publication date:
07/07/2023
A null pointer dereference was found in libpano13, version libpano13-2.9.20. The flow allows attackers to cause a denial of service and potential code execute via a crafted file.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2023