Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-21624

Publication date:
09/02/2024
nonebot2 is a cross-platform Python asynchronous chatbot framework written in Python. This security advisory pertains to a potential information leak (e.g., environment variables) in instances where developers utilize `MessageTemplate` and incorporate user-provided data into templates. The identified vulnerability has been remedied in pull request #2509 and will be included in versions released from 2.2.0. Users are strongly advised to upgrade to these patched versions to safeguard against the vulnerability. A temporary workaround involves filtering underscores before incorporating user input into the message template.
Severity CVSS v4.0: Pending analysis
Last modification:
16/02/2024

CVE-2024-23322

Publication date:
09/02/2024
Envoy is a high-performance edge/middle/service proxy. Envoy will crash when certain timeouts happen within the same interval. The crash occurs when the following are true: 1. hedge_on_per_try_timeout is enabled, 2. per_try_idle_timeout is enabled (it can only be done in configuration), 3. per-try-timeout is enabled, either through headers or configuration and its value is equal, or within the backoff interval of the per_try_idle_timeout. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2024

CVE-2024-23323

Publication date:
09/02/2024
Envoy is a high-performance edge/middle/service proxy. The regex expression is compiled for every request and can result in high CPU usage and increased request latency when multiple routes are configured with such matchers. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2024

CVE-2023-45718

Publication date:
09/02/2024
Sametime is impacted by a failure to invalidate sessions. The application is setting sensitive cookie values in a persistent manner in Sametime Web clients. When this happens, cookie values can remain valid even after a user has closed out their session.  <br />
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2023-45716

Publication date:
09/02/2024
Sametime is impacted by sensitive information passed in URL. <br />
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2023-50349

Publication date:
09/02/2024
Sametime is impacted by a Cross Site Request Forgery (CSRF) vulnerability. Some REST APIs in the Sametime Proxy application can allow an attacker to perform malicious actions on the application. <br />
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2024-1245

Publication date:
09/02/2024
Concrete CMS version 9 before 9.2.5 is vulnerable to stored XSS in file tags and description attributes since administrator entered file attributes are not sufficiently sanitized in the Edit Attributes page. A rogue administrator could put malicious code into the file tags or description attributes and, when another administrator opens the same file for editing, the malicious code could execute. The Concrete CMS Security team scored this 2.4 with CVSS v3 vector AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N. <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2024

CVE-2024-1246

Publication date:
09/02/2024
Concrete CMS in version 9 before 9.2.5 is vulnerable to reflected XSS via the Image URL Import Feature due to insufficient validation of administrator provided data. A rogue administrator could inject malicious code when importing images, leading to the execution of the malicious code on the website user’s browser. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N. This does not affect Concrete versions prior to version 9.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2024

CVE-2024-1247

Publication date:
09/02/2024
Concrete CMS version 9 before 9.2.5 is vulnerable to  stored XSS via the Role Name field since there is insufficient validation of administrator provided data for that field. A rogue administrator could inject malicious code into the Role Name field which might be executed when users visit the affected page. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . Concrete versions below 9 do not include group types so they are not affected by this vulnerability. <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2024

CVE-2023-50291

Publication date:
09/02/2024
Insufficiently Protected Credentials vulnerability in Apache Solr.<br /> <br /> This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.3.0.<br /> One of the two endpoints that publishes the Solr process&amp;#39; Java system properties, /admin/info/properties, was only setup to hide system properties that had "password" contained in the name.<br /> There are a number of sensitive system properties, such as "basicauth" and "aws.secretKey" do not contain "password", thus their values were published via the "/admin/info/properties" endpoint.<br /> This endpoint populates the list of System Properties on the home screen of the Solr Admin page, making the exposed credentials visible in the UI.<br /> <br /> This /admin/info/properties endpoint is protected under the "config-read" permission.<br /> Therefore, Solr Clouds with Authorization enabled will only be vulnerable through logged-in users that have the "config-read" permission.<br /> Users are recommended to upgrade to version 9.3.0 or 8.11.3, which fixes the issue.<br /> A single option now controls hiding Java system property for all endpoints, "-Dsolr.hiddenSysProps".<br /> By default all known sensitive properties are hidden (including "-Dbasicauth"), as well as any property with a name containing "secret" or "password".<br /> <br /> Users who cannot upgrade can also use the following Java system property to fix the issue:<br />   &amp;#39;-Dsolr.redaction.system.pattern=.*(password|secret|basicauth).*&amp;#39;
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2025

CVE-2023-50292

Publication date:
09/02/2024
Incorrect Permission Assignment for Critical Resource, Improper Control of Dynamically-Managed Code Resources vulnerability in Apache Solr.<br /> <br /> This issue affects Apache Solr: from 8.10.0 through 8.11.2, from 9.0.0 before 9.3.0.<br /> <br /> The Schema Designer was introduced to allow users to more easily configure and test new Schemas and configSets.<br /> However, when the feature was created, the "trust" (authentication) of these configSets was not considered.<br /> External library loading is only available to configSets that are "trusted" (created by authenticated users), thus non-authenticated users are unable to perform Remote Code Execution.<br /> Since the Schema Designer loaded configSets without taking their "trust" into account, configSets that were created by unauthenticated users were allowed to load external libraries when used in the Schema Designer.<br /> <br /> Users are recommended to upgrade to version 9.3.0, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2025

CVE-2023-50298

Publication date:
09/02/2024
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1.<br /> <br /> Solr Streaming Expressions allows users to extract data from other Solr Clouds, using a "zkHost" parameter.<br /> When original SolrCloud is setup to use ZooKeeper credentials and ACLs, they will be sent to whatever "zkHost" the user provides.<br /> An attacker could setup a server to mock ZooKeeper, that accepts ZooKeeper requests with credentials and ACLs and extracts the sensitive information,<br /> then send a streaming expression using the mock server&amp;#39;s address in "zkHost".<br /> Streaming Expressions are exposed via the "/streaming" handler, with "read" permissions.<br /> <br /> Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue.<br /> From these versions on, only zkHost values that have the same server address (regardless of chroot), will use the given ZooKeeper credentials and ACLs when connecting.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025