Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-37940

Publication date:
22/03/2023
Potential security vulnerabilities have been identified in the HPE FlexFabric 5700 Switch Series. These vulnerabilities could be remotely exploited to allow host header injection and URL redirection. HPE has made the following software to resolve the vulnerability in HPE FlexFabric 5700 Switch Series version R2432P61 or later.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-1168

Publication date:
22/03/2023
An authenticated remote code execution vulnerability<br /> exists in the AOS-CX Network Analytics Engine. Successful<br /> exploitation of this vulnerability results in the ability to<br /> execute arbitrary code as a privileged user on the underlying<br /> operating system, leading to a complete compromise of the<br /> switch running AOS-CX.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-1370

Publication date:
22/03/2023
[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib.<br /> <br /> When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively.<br /> <br /> It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-1436

Publication date:
22/03/2023
An infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This leads to a StackOverflowError exception being thrown.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-3091

Publication date:
22/03/2023
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-45634

Publication date:
22/03/2023
An issue discovered in MEGAFEIS, BOFEI DBD+ Application for IOS &amp; Android v1.4.4 allows authenticated attacker to gain access to sensitive account information
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-27857

Publication date:
22/03/2023
<br /> In affected versions, a heap-based buffer over-read condition occurs when the message field indicates more data than is present in the message field<br /> <br /> <br /> <br /> in Rockwell Automation&amp;#39;s ThinManager ThinServer.  An unauthenticated remote attacker can exploit this vulnerability to crash ThinServer.exe due to a read access violation.<br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2024

CVE-2023-27855

Publication date:
22/03/2023
<br /> In affected versions, a path traversal exists when processing a message in Rockwell Automation&amp;#39;s ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-27856

Publication date:
22/03/2023
<br /> <br /> <br /> In affected versions, path traversal exists when processing a message of type 8<br /> <br /> in Rockwell Automation&amp;#39;s ThinManager ThinServer. <br /> <br /> An unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-28725

Publication date:
22/03/2023
General Bytes Crypto Application Server (CAS) 20230120, as distributed with General Bytes BATM devices, allows remote attackers to execute arbitrary Java code by uploading a Java application to the /batm/app/admin/standalone/deployments directory, aka BATM-4780, as exploited in the wild in March 2023. This is fixed in 20221118.48 and 20230120.44.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2022-43512

Publication date:
21/03/2023
Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2025

CVE-2022-41696

Publication date:
21/03/2023
Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2025