Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-2336

Publication date:
27/04/2023
Path Traversal in GitHub repository pimcore/pimcore prior to 10.5.21.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2023

CVE-2023-2339

Publication date:
27/04/2023
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2023

CVE-2023-2328

Publication date:
27/04/2023
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2023

CVE-2023-2327

Publication date:
27/04/2023
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2023

CVE-2023-1778

Publication date:
27/04/2023
This vulnerability exists in GajShield Data Security Firewall firmware versions prior to v4.28 (except v4.21) due to insecure default credentials which allows remote attacker to login as superuser by using default username/password via web-based management interface and/or exposed SSH port thereby enabling remote attackers to execute arbitrary commands with administrative/superuser privileges on the targeted systems.<br /> <br /> The vulnerability has been addressed by forcing the user to change their default password to a new non-default password.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2023

CVE-2023-2323

Publication date:
27/04/2023
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2023

CVE-2023-28769

Publication date:
27/04/2023
The buffer overflow vulnerability in the library “libclinkc.so” of the web server “zhttpd” in Zyxel DX5401-B0 firmware versions prior to V5.17(ABYO.1)C0 could allow a remote unauthenticated attacker to execute some OS commands or to cause denial-of-service (DoS) conditions on a vulnerable device.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2023

CVE-2023-2322

Publication date:
27/04/2023
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2023

CVE-2023-28770

Publication date:
27/04/2023
The sensitive information exposure vulnerability in the CGI “Export_Log” and the binary “zcmd” in Zyxel DX5401-B0 firmware versions prior to V5.17(ABYO.1)C0 could allow a remote unauthenticated attacker to read the system files and to retrieve the password of the supervisor from the encrypted file.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2025

CVE-2023-31290

Publication date:
27/04/2023
Trust Wallet Core before 3.1.1, as used in the Trust Wallet browser extension before 0.0.183, allows theft of funds because the entropy is 32 bits, as exploited in the wild in December 2022 and March 2023. This occurs because the mt19937 Mersenne Twister takes a single 32-bit value as an input seed, resulting in only four billion possible mnemonics. The affected versions of the browser extension are 0.0.172 through 0.0.182. To steal funds efficiently, an attacker can identify all Ethereum addresses created since the 0.0.172 release, and check whether they are Ethereum addresses that could have been created by this extension. To respond to the risk, affected users need to upgrade the product version and also move funds to a new wallet address.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2025

CVE-2023-31285

Publication date:
27/04/2023
An XSS issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. When users upload temporary files, some specific file endings are not allowed, but it is possible to upload .html or .htm files containing an XSS payload. The resulting link can be sent to an administrator user.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2025

CVE-2023-31286

Publication date:
27/04/2023
An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. When a password reset request occurs, the server response leaks the existence of users. If one tries to reset a password of a non-existent user, an error message indicates that this user does not exist.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2025