Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-4294

Publication date:
10/01/2023
Norton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-22911

Publication date:
10/01/2023
An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. E-Widgets does widget replacement in HTML attributes, which can lead to XSS, because widget authors often do not expect that their widget is executed in an HTML attribute context.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2023-22909

Publication date:
10/01/2023
An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. SpecialMobileHistory allows remote attackers to cause a denial of service because database queries are slow.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2022-48251

Publication date:
10/01/2023
The AES instructions on the ARMv8 platform do not have an algorithm that is "intrinsically resistant" to side-channel attacks. NOTE: the vendor reportedly offers the position "while power side channel attacks ... are possible, they are not directly caused by or related to the Arm architecture."
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2021-46871

Publication date:
10/01/2023
tag.ex in Phoenix Phoenix.HTML (aka phoenix_html) before 3.0.4 allows XSS in HEEx class attributes.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2017-20166

Publication date:
10/01/2023
Ecto 2.2.0 lacks a certain protection mechanism associated with the interaction between is_nil and raise.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2023-22903

Publication date:
10/01/2023
api/views/user.py in LibrePhotos before e19e539 has incorrect access control.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2023-22320

Publication date:
10/01/2023
OpenAM Web Policy Agent (OpenAM Consortium Edition) provided by OpenAM Consortium parses URLs improperly, leading to a path traversal vulnerability(CWE-22). Furthermore, a crafted URL may be evaluated incorrectly.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2023-0023

Publication date:
10/01/2023
In SAP Bank Account Management (Manage Banks) application, when a user clicks a smart link to navigate to another app, personal data is shown directly in the URL. They might get captured in log files, bookmarks, and so on disclosing sensitive data of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2023

CVE-2023-0022

Publication date:
10/01/2023
SAP BusinessObjects Business Intelligence Analysis edition for OLAP allows an authenticated attacker to inject malicious code that can be executed by the application over the network. On successful exploitation, an attacker can perform operations that may completely compromise the application causing a high impact on the confidentiality, integrity, and availability of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
18/01/2023

CVE-2023-0015

Publication date:
10/01/2023
In SAP BusinessObjects Business Intelligence Platform (Web Intelligence user interface) - version 420, some calls return json with wrong content type in the header of the response. As a result, a custom application that calls directly the jsp of Web Intelligence DHTML may be vulnerable to XSS attacks. On successful exploitation an attacker can cause limited impact on confidentiality and integrity of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2023

CVE-2023-0017

Publication date:
10/01/2023
An unauthenticated attacker in SAP NetWeaver AS for Java - version 7.50, due to improper access control, can attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data on the current system. This could allow the attacker to have full read access to user data, make modifications to user data, and make services within the system unavailable.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2023