Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-26320

Publication date:
11/10/2023
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Xiaomi Xiaomi Router allows Command Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2024

CVE-2023-37536

Publication date:
11/10/2023
An integer overflow in xerces-c++ 3.2.3 in BigFix Platform allows remote attackers to cause out-of-bound access via HTTP request.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2022-44757

Publication date:
11/10/2023
BigFix Insights for Vulnerability Remediation (IVR) uses weak cryptography that can lead to credential exposure. An attacker could gain access to sensitive information, modify data in unexpected ways, etc.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2023

CVE-2022-44758

Publication date:
11/10/2023
BigFix Insights/IVR fixlet uses improper credential handling within certain fixlet content. An attacker can gain access to information that is not explicitly authorized.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2023

CVE-2023-26318

Publication date:
11/10/2023
Buffer Copy without Checking Size of Input (&amp;#39;Classic Buffer Overflow&amp;#39;) vulnerability in Xiaomi Xiaomi Router allows Overflow Buffers.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2023

CVE-2022-42451

Publication date:
11/10/2023
Certain credentials within the BigFix Patch Management Download Plug-ins are stored insecurely and could be exposed to a local privileged user.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2024

CVE-2023-44689

Publication date:
11/10/2023
e-Gov Client Application (Windows version) versions prior to 2.1.1.0 and e-Gov Client Application (macOS version) versions prior to 1.1.1.0 are vulnerable to improper authorization in handler for custom URL scheme. A crafted URL may direct the product to access an arbitrary website. As a result, the user may become a victim of a phishing attack.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-45194

Publication date:
11/10/2023
Use of default credentials vulnerability in MR-GM2 firmware Ver. 3.00.03 and earlier, and MR-GM3 (-D/-K/-S/-DK/-DKS/-M/-W) firmware Ver. 1.03.45 and earlier allows a network-adjacent unauthenticated attacker to intercept wireless LAN communication, when the affected product performs the communication without changing the pre-shared key from the factory-default configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2023

CVE-2023-5511

Publication date:
11/10/2023
Cross-Site Request Forgery (CSRF) in GitHub repository snipe/snipe-it prior to v.6.2.3.
Severity CVSS v4.0: Pending analysis
Last modification:
12/10/2023

CVE-2023-26220

Publication date:
10/10/2023
The Spotfire Library component of TIBCO Software Inc.&amp;#39;s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.&amp;#39;s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-36126

Publication date:
10/10/2023
There is a Cross Site Scripting (XSS) vulnerability in the "theme" parameter of preview.php in PHPJabbers Appointment Scheduler v3.0
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-36127

Publication date:
10/10/2023
User enumeration is found in in PHPJabbers Appointment Scheduler 3.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023