Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-0052

Publication date:
20/01/2023
SAUTER Controls Nova 200–220 Series with firmware version 3.3-006 and prior and BACnetstac version 4.2.1 and prior allows the execution of commands without credentials. As Telnet and file transfer protocol (FTP) are the only protocols available for device management, an unauthorized user could access the system and modify the device configuration, which could result in the unauthorized user executing unrestricted malicious commands.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2023

CVE-2023-23607

Publication date:
20/01/2023
erohtar/Dasherr is a dashboard for self-hosted services. In affected versions unrestricted file upload allows any unauthenticated user to execute arbitrary code on the server. The file /www/include/filesave.php allows for any file to uploaded to anywhere. If an attacker uploads a php file they can execute code on the server. This issue has been addressed in version 1.05.00. Users are advised to upgrade. There are no known workarounds for this issue.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-24025

Publication date:
20/01/2023
CRYSTALS-DILITHIUM (in Post-Quantum Cryptography Selected Algorithms 2022) in PQClean d03da30 may allow universal forgeries of digital signatures via a template side-channel attack because of intermediate data leakage of one vector.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2021-33642

Publication date:
20/01/2023
When a file is processed, an infinite loop occurs in next_inline() of the more_curly() function.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2021-33641

Publication date:
20/01/2023
When processing files, malloc stores the data of the current line. When processing comments, malloc incorrectly accesses the released memory (use after free).
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2020-25502

Publication date:
20/01/2023
Cybereason EDR version 19.1.282 and above, 19.2.182 and above, 20.1.343 and above, and 20.2.X and above has a DLL hijacking vulnerability, which could allow a local attacker to execute code with elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2022-1109

Publication date:
20/01/2023
An incorrect default permissions vulnerability in Lenovo Leyun cloud music application could allow denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2023

CVE-2022-3918

Publication date:
20/01/2023
A program using FoundationNetworking in swift-corelibs-foundation is potentially vulnerable to CRLF ( ) injection in URLRequest headers. In this vulnerability, a client can insert one or several CRLF sequences into a URLRequest header value. When that request is sent via URLSession to an HTTP server, the server may interpret the content after the CRLF as extra headers, or even a second request. For example, consider a URLRequest to http://example.com/ with the GET method. Suppose we set the URLRequest header "Foo" to the value "Bar Extra-Header: Added GET /other HTTP/1.1". When this request is sent, it will appear to the server as two requests: GET / HTTP/1.1 Foo: Bar Extra-Header: Added GET /other HTTP/1.1 In this manner, the client is able to inject extra headers and craft an entirely new request to a separate path, despite only making one API call in URLSession. If a developer has total control over the request and its headers, this vulnerability may not pose a threat. However, this vulnerability escalates if un-sanitized user input is placed in header values. If so, a malicious user could inject new headers or requests to an intermediary or backend server. Developers should be especially careful to sanitize user input in this case, or upgrade their version of swift-corelibs-foundation to include the patch below.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2023-23491

Publication date:
20/01/2023
The Quick Event Manager WordPress Plugin, version
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2023-23492

Publication date:
20/01/2023
The Login with Phone Number WordPress Plugin, version
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2023-23490

Publication date:
20/01/2023
The Survey Maker WordPress Plugin, version
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2023-23015

Publication date:
20/01/2023
Cross Site Scripting (XSS) vulnerability in Kalkun 0.8.0 via username input in file User_model.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025