Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-26969

Publication date:
14/04/2023
Atropim 1.5.26 is vulnerable to Directory Traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-29491

Publication date:
14/04/2023
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-2034

Publication date:
14/04/2023
Unrestricted Upload of File with Dangerous Type in GitHub repository froxlor/froxlor prior to 2.0.14.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2023

CVE-2023-29132

Publication date:
14/04/2023
Irssi 1.3.x and 1.4.x before 1.4.4 has a use-after-free because of use of a stale special collector reference. This occurs when printing of a non-formatted line is concurrent with printing of a formatted line.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2023-27890

Publication date:
14/04/2023
The Export User plugin through 2.0 for MyBB allows XSS during the process of an admin generating DSGVO data for a user, via the Custom User Title, Location, or Bio field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2024

CVE-2023-30638

Publication date:
14/04/2023
Atos Unify OpenScape SBC 10 before 10R3.1.3, OpenScape Branch 10 before 10R3.1.2, and OpenScape BCF 10 before 10R10.7.0 allow remote authenticated admins to inject commands.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-26918

Publication date:
14/04/2023
Diasoft File Replication Pro 7.5.0 allows attackers to escalate privileges by replacing a legitimate file with a Trojan horse that will be executed as LocalSystem. This occurs because %ProgramFiles%\FileReplicationPro allows Everyone:(F) access.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-30635

Publication date:
13/04/2023
TiKV 6.1.2 allows remote attackers to cause a denial of service (fatal error) upon an attempt to get a timestamp from the Placement Driver.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-30636

Publication date:
13/04/2023
TiKV 6.1.2 allows remote attackers to cause a denial of service (fatal error, with RpcStatus UNAVAILABLE for "not leader") upon an attempt to start a node in a situation where the context deadline is exceeded
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-30637

Publication date:
13/04/2023
Baidu braft 1.1.2 has a memory leak related to use of the new operator in example/atomic/atomic_server. NOTE: installations with brpc-0.14.0 and later are unaffected.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-1326

Publication date:
13/04/2023
A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.
Severity CVSS v4.0: Pending analysis
Last modification:
19/04/2023

CVE-2022-48468

Publication date:
13/04/2023
protobuf-c before 1.4.1 has an unsigned integer overflow in parse_required_member.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025