Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-0440

Publication date:
23/01/2023
Observable Discrepancy in GitHub repository healthchecks/healthchecks prior to v2.6.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2023

CVE-2023-24069

Publication date:
23/01/2023
Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to obtain potentially sensitive attachments sent in messages from the attachments.noindex directory. Cached attachments are not effectively cleared. In some cases, even after a self-initiated file deletion, an attacker can still recover the file if it was previously replied to in a conversation. (Local filesystem access is needed by the attacker.) NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access.
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2024

CVE-2023-24068

Publication date:
23/01/2023
Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to modify conversation attachments within the attachments.noindex directory. Client mechanisms fail to validate modifications of existing cached files, resulting in an attacker's ability to insert malicious code into pre-existing attachments or replace them completely. A threat actor can forward the existing attachment in the corresponding conversation to external groups, and the name and size of the file will not change, allowing the malware to masquerade as another file. NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2024

CVE-2023-24070

Publication date:
23/01/2023
app/View/AuthKeys/authkey_display.ctp in MISP through 2.4.167 has an XSS in authkey add via a Referer field.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2024

CVE-2022-46959

Publication date:
23/01/2023
An issue in the component /admin/backups/work-dir of Sonic v1.0.4 allows attackers to execute a directory traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2023-23314

Publication date:
23/01/2023
An arbitrary file upload vulnerability in the /api/upload component of zdir v3.2.0 allows attackers to execute arbitrary code via a crafted .ssh file.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2022-48281

Publication date:
23/01/2023
processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2023-0435

Publication date:
22/01/2023
Excessive Attack Surface in GitHub repository pyload/pyload prior to 0.5.0b3.dev41.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2023

CVE-2023-24059

Publication date:
22/01/2023
Grand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2023-24058

Publication date:
22/01/2023
Booked Scheduler 2.5.5 allows authenticated users to create and schedule events for any other user via a modified userId value to reservation_save.php. NOTE: 2.5.5 is a version from 2014; the latest version of Booked Scheduler is not affected. However, LabArchives Scheduler (Sep 6, 2022 Feature Release) is affected.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2023-24056

Publication date:
22/01/2023
In pkgconf through 1.9.3, variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. For example, a .pc file containing a few hundred bytes can expand to one billion bytes.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2023-24055

Publication date:
22/01/2023
KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2024