Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-31114

Publication date:
07/06/2023
An issue was discovered in the Shannon RCS component in Samsung Exynos Modem 5123 and 5300. Incorrect resource transfer between spheres can cause unintended querying of the SIM status via a crafted application.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2023-25177

Publication date:
07/06/2023
<br /> Delta Electronics&amp;#39; CNCSoft-B DOPSoft versions 1.0.0.4 and prior are <br /> vulnerable to stack-based buffer overflow, which could allow an attacker<br /> to execute arbitrary code.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/06/2023

CVE-2023-31115

Publication date:
07/06/2023
An issue was discovered in the Shannon RCS component in Samsung Exynos Modem 5123 and 5300. Incorrect resource transfer between spheres can cause changes to the activation mode of RCS via a crafted application.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2023-31116

Publication date:
07/06/2023
An issue was discovered in the Shannon RCS component in Samsung Exynos Modem 5123 and 5300. An incorrect default permission can cause unintended querying of RCS capability via a crafted application.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2023-33848

Publication date:
07/06/2023
IBM TXSeries for Multiplatforms 8.1, 8.2, 9.1, CICS TX Standard, 11.1, CICS TX Advanced 10.1, and 11.1 could allow a privileged user to obtain highly sensitive information by enabling debug mode. IBM X-Force ID: 257104.
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2023

CVE-2023-2866

Publication date:
07/06/2023
<br /> If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2023

CVE-2023-33496

Publication date:
07/06/2023
xxl-rpc v1.7.0 was discovered to contain a deserialization vulnerability via the component com.xxl.rpc.core.remoting.net.impl.netty.codec.NettyDecode#decode.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2023-1864

Publication date:
07/06/2023
FANUC ROBOGUIDE-HandlingPRO Versions 9 Rev.ZD and prior is vulnerable to<br /> a path traversal, which could allow an attacker to remotely read files <br /> on the system running the affected software. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2023

CVE-2023-1709

Publication date:
07/06/2023
<br /> Datalogics Library APDFLThe v18.0.4PlusP1e and prior contains a stack-based buffer overflow due to documents containing corrupted fonts, which could allow an attack that causes an unhandled crash during the rendering process.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-34237

Publication date:
07/06/2023
SABnzbd is an open source automated Usenet download tool. A design flaw was discovered in SABnzbd that could allow remote code execution. Manipulating the Parameters setting in the Notification Script functionality allows code execution with the privileges of the SABnzbd process. Exploiting the vulnerabilities requires access to the web interface. Remote exploitation is possible if users[exposed their setup to the internet or other untrusted networks without setting a username/password. By default SABnzbd is only accessible from `localhost`, with no authentication required for the web interface. This issue has been patched in commits `e3a722` and `422b4f` which have been included in the 4.0.2 release. Users are advised to upgrade. Users unable to upgrade should ensure that a username and password have been set if their instance is web accessible.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2023

CVE-2023-33864

Publication date:
07/06/2023
StreamReader::ReadFromExternal in RenderDoc before 1.27 allows an Integer Overflow with a resultant Buffer Overflow. It uses uint32_t(m_BufferSize-m_InputSize) even though m_InputSize can exceed m_BufferSize.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-33865

Publication date:
07/06/2023
RenderDoc before 1.27 allows local privilege escalation via a symlink attack. It relies on the /tmp/RenderDoc directory regardless of ownership.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025