Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-22159

Publication date:
18/07/2023
EVERTZ devices 3080IPX exe-guest-v1.2-r26125, 7801FC 1.3 Build 27, and 7890IXG V494 are vulnerable to Arbitrary File Upload, allowing an authenticated attacker to upload a webshell or overwrite any critical system files.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023

CVE-2023-33231

Publication date:
18/07/2023
XSS attack was possible in DPA 2023.2 due to insufficient input validation
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2023

CVE-2023-0160

Publication date:
18/07/2023
A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-37259

Publication date:
18/07/2023
matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored Cross site scripting (XSS). Since the Export Chat feature generates a separate document, an attacker can only inject code run from the `null` origin, restricting the impact. However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side. This issue has been addressed in commit `22fcd34c60` which is included in release version 3.76.0. Users are advised to upgrade. The only known workaround for this issue is to disable or to not use the Export Chat feature.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2021-4428

Publication date:
18/07/2023
A vulnerability has been found in what3words Autosuggest Plugin up to 4.0.0 on WordPress and classified as problematic. Affected by this vulnerability is the function enqueue_scripts of the file w3w-autosuggest/public/class-w3w-autosuggest-public.php of the component Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 4.0.1 is able to address this issue. The patch is named dd59cbac5f86057d6a73b87007c08b8bfa0c32ac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-234247.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-34035

Publication date:
18/07/2023
Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)<br /> <br /> Specifically, an application is vulnerable when all of the following are true:<br /> <br /> * Spring MVC is on the classpath<br /> * Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet)<br /> * The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints<br /> <br /> <br /> An application is not vulnerable if any of the following is true:<br /> <br /> * The application does not have Spring MVC on the classpath<br /> * The application secures no servlets other than Spring MVC’s DispatcherServlet<br /> * The application uses requestMatchers(String) only for Spring MVC endpoints<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2023-2263

Publication date:
18/07/2023
<br /> The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing.  The new ENIP connections cannot be established if impacted by this vulnerability,  which prohibits operational capabilities of the device resulting in a denial-of-service attack.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2023-33265

Publication date:
18/07/2023
In Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, executor services don&amp;#39;t check client permissions properly, allowing authenticated users to execute tasks on members without the required permissions granted.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2023-36120

Publication date:
18/07/2023
Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-31441

Publication date:
18/07/2023
In NATO Communications and Information Agency anet (aka Advisor Network) through 3.3.0, an attacker can provide a crafted JSON file to sanitizeJson and cause an exception. This is related to the U+FFFD Unicode replacement character. A for loop does not consider that a data structure is being modified during loop execution.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2020-36762

Publication date:
18/07/2023
A vulnerability was found in ONS Digital RAS Collection Instrument up to 2.0.27 and classified as critical. Affected by this issue is the function jobs of the file .github/workflows/comment.yml. The manipulation of the argument $COMMENT_BODY leads to os command injection. Upgrading to version 2.0.28 is able to address this issue. The name of the patch is dcaad2540f7d50c512ff2e031d3778dd9337db2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-234248.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-36384

Publication date:
18/07/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in CodePeople Booking Calendar Contact Form plugin
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023