Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2016-15029

Publication date:
21/03/2023
A vulnerability has been found in Ydalb mapicoin up to 1.9.0 and classified as problematic. This vulnerability affects unknown code of the file webroot/stats.php. The manipulation of the argument link/search leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.10.0 is able to address this issue. The patch is identified as 67e87f0f0c1ac238fcd050f4c3db298229bc9679. It is recommended to upgrade the affected component. VDB-223402 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-27981

Publication date:
21/03/2023
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists in Custom Reports that could cause a remote code execution when a victim tries to open a malicious report. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2023

CVE-2023-27978

Publication date:
21/03/2023
A CWE-502: Deserialization of Untrusted Data vulnerability exists in the Dashboard module that could cause an interpretation of malicious payload data, potentially leading to remote code execution when an attacker gets the user to open a malicious file. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2023

CVE-2023-1462

Publication date:
21/03/2023
Authorization Bypass Through User-Controlled Key vulnerability in Vadi Corporate Information Systems DigiKent allows Authentication Bypass, Authentication Abuse. This issue affects DigiKent: before 23.03.20.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-27982

Publication date:
21/03/2023
A CWE-345: Insufficient Verification of Data Authenticity vulnerability exists in the Data Server that could cause manipulation of dashboard files in the IGSS project report directory, when an attacker sends specific crafted messages to the Data Server TCP port, this could lead to remote code execution when a victim eventually opens a malicious dashboard file. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2023

CVE-2023-27980

Publication date:
21/03/2023
A CWE-306: Missing Authentication for Critical Function vulnerability exists in the Data Server TCP interface that could allow the creation of a malicious report file in the IGSS project report directory, this could lead to remote code execution when a victim eventually opens the report. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior)
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2023

CVE-2022-42485

Publication date:
21/03/2023
Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Galaxy Weblinks Gallery with thumbnail slider plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-41831

Publication date:
21/03/2023
Auth. (contributor+) Cross-Site Scripting vulnerability in TCBarrett WP Glossary plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-41785

Publication date:
21/03/2023
Auth. (contributor+) Stored Cross-Site Scripting vulnerability in Galleryape Gallery Images Ape plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-1543

Publication date:
21/03/2023
Insufficient Session Expiration in GitHub repository answerdev/answer prior to 1.0.6.
Severity CVSS v4.0: Pending analysis
Last modification:
23/03/2023

CVE-2023-1541

Publication date:
21/03/2023
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2023

CVE-2023-1542

Publication date:
21/03/2023
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2023